Malware Analysis Report

2024-08-06 13:36

Sample ID 240618-ammfdatgnk
Target ba4048bd09b860638952397c4bf83eeb_JaffaCakes118
SHA256 dd860b1b9612e733d8f0985148b1f47cd9361243ccb729c3b6c3c2280461e157
Tags
azorult infostealer trojan discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

dd860b1b9612e733d8f0985148b1f47cd9361243ccb729c3b6c3c2280461e157

Threat Level: Known bad

The file ba4048bd09b860638952397c4bf83eeb_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

azorult infostealer trojan discovery

Azorult

Downloads MZ/PE file

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Checks installed software on the system

Suspicious use of NtSetInformationThreadHideFromDebugger

Program crash

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 00:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 00:19

Reported

2024-06-18 00:22

Platform

win7-20240221-en

Max time kernel

141s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe N/A

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 832

Network

Country Destination Domain Proto
US 8.8.8.8:53 jlckey.000webhostapp.com udp
US 145.14.145.114:80 jlckey.000webhostapp.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe

MD5 6539c93ba82b568ecc558ae1d18f5228
SHA1 ba820679e051c87b939c2888cd8e9e24f529173a
SHA256 5ca3f43e97cfbcb135804e430fc88f7d26287d924514b34b8ec11159e1c36fcf
SHA512 27efe64e1065b4814fc20b4b994762f80ed327ded1c4a65cfde1627b54322792c640e4e71b61afb2e32163b24acb7516911c861439224ca6c1d01ad22453aa17

memory/2664-18-0x0000000004070000-0x00000000043F4000-memory.dmp

memory/2664-21-0x0000000004070000-0x00000000043F4000-memory.dmp

memory/2832-20-0x0000000000400000-0x0000000000784000-memory.dmp

memory/2664-19-0x0000000004070000-0x00000000043F4000-memory.dmp

memory/2832-27-0x0000000000400000-0x0000000000784000-memory.dmp

memory/2664-29-0x0000000004070000-0x00000000043F4000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 00:19

Reported

2024-06-18 00:22

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Downloads MZ/PE file

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe N/A

Checks installed software on the system

discovery

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe N/A

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 212 wrote to memory of 3924 N/A C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe
PID 212 wrote to memory of 3924 N/A C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe
PID 212 wrote to memory of 3924 N/A C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe
PID 212 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe
PID 212 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe
PID 4880 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe
PID 4880 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe
PID 2672 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe
PID 2672 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\ba4048bd09b860638952397c4bf83eeb_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3924 -ip 3924

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 1424

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3764,i,13544508926340531097,6671217806016090640,262144 --variations-seed-version --mojo-platform-channel-handle=4016 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe"

C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe

"C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe" /update:"C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe" /updated:"C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 jlckey.000webhostapp.com udp
US 145.14.144.122:80 jlckey.000webhostapp.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 122.144.14.145.in-addr.arpa udp
US 8.8.8.8:53 files.surfright.nl udp
US 8.8.8.8:53 cloud.hitmanpro.com udp
NL 185.105.204.28:80 files.surfright.nl tcp
NL 52.174.35.5:80 cloud.hitmanpro.com tcp
US 8.8.8.8:53 28.204.105.185.in-addr.arpa udp
US 8.8.8.8:53 5.35.174.52.in-addr.arpa udp
US 8.8.8.8:53 scan.hitmanpro.com udp
NL 52.174.35.5:80 scan.hitmanpro.com tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 225.162.46.104.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwerty.exe

MD5 6539c93ba82b568ecc558ae1d18f5228
SHA1 ba820679e051c87b939c2888cd8e9e24f529173a
SHA256 5ca3f43e97cfbcb135804e430fc88f7d26287d924514b34b8ec11159e1c36fcf
SHA512 27efe64e1065b4814fc20b4b994762f80ed327ded1c4a65cfde1627b54322792c640e4e71b61afb2e32163b24acb7516911c861439224ca6c1d01ad22453aa17

memory/3924-11-0x0000000000400000-0x0000000000784000-memory.dmp

memory/3924-12-0x0000000000400000-0x0000000000784000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\HitmanPro_x64.exe

MD5 ea1a56e0bb7313d00b83ed88f69d289b
SHA1 839e555e4a3677db282938ab864075f49689afad
SHA256 fd248cd4516e7838637446bec666fe248bb01fa231a47f1f34d13cb09e445e7d
SHA512 933d8d3ca7b3947474352bb637c019c6086859ff60a12549051495d48281712cd9c02dfa7def124be148a1e2850c65dfb9ad25a502552720717cc513b2c7c0b9

C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe

MD5 57ae72bca137c9ec15470087d2a4c378
SHA1 e4dd10c770a7ec7993ed47a37d1f7182e907e3ed
SHA256 cfeea4ea5121d1e6b1edbd5ca6e575830a0a4cbaf63120bc36639c44e1b89781
SHA512 f80d6732e86a8d38db1ff43c0c5058013bd456c4b86b87018166ca073bc84fb8e7676b55371ae9cec668a77d198e1e7f6854a9a93581ed21a32167e3b9533f6e

memory/4880-39-0x000002ACF2160000-0x000002ACF222D000-memory.dmp

memory/376-45-0x0000027F85FC0000-0x0000027F8608D000-memory.dmp