Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
a577a0a898643bc68070a899c2b5f45d
-
SHA1
65a0a3baa98bc1629b6b1e526b9a6f329a2c475d
-
SHA256
bd6e50992b8d302359fd95c467681e74d8bf0754ebc87c5a654c7976e16ecb66
-
SHA512
359def7f92b2325474efb6a1855bea17ccdf9aba5d03fde0fc365df6d39205aaed4aec01e308ade7433969fafcd531095adb669928867fafcd61501b4ae85e9b
-
SSDEEP
24576:FdHPXnvcC964ukjOs1iq8ZqI1IT96tyzU3SWf:F9vvM4sHq9QyIf
Malware Config
Extracted
azorult
http://jatkit.gq/0200-capt2/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Macromedia\\StikyNot.exe" a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4260 set thread context of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89 PID 4260 wrote to memory of 3188 4260 a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a577a0a898643bc68070a899c2b5f45d_JaffaCakes118.exe"2⤵PID:3188
-