Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18-06-2024 13:13

General

  • Target

    bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe

  • Size

    3.4MB

  • MD5

    bc1dddf042ec8cadfcd803a03edd23ee

  • SHA1

    22c925291332a1eb102501fc2e5ac93b04d4ce12

  • SHA256

    ad9093633b9ecaeea7bff69ab8d8781213fec82db6c7f2e963a40d2e0ee0e9ce

  • SHA512

    ffbc8fbbf6b76c2d0d672ba0ef94b93e3751850ccfc720f22bd39a84f10b616ca649f55c182d03d7654c729745cea10dd06f24189d6098fbc53a808a0c91ac03

  • SSDEEP

    98304:1AI+ZTAf+MzQSioq96WMb3O6pLve2WX69t6S9IuvT:mtTMZq9666pLvejX06SOuvT

Malware Config

Extracted

Family

azorult

C2

http://92.63.192.72/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Program Files (x86)\LetsSee!\busshost.exe
      "C:\Program Files (x86)\LetsSee!\busshost.exe"
      2⤵
      • Executes dropped EXE
      PID:3048
    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      "C:\Program Files (x86)\LetsSee!\YTLoader.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1180
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\LetsSee!\YTLoader.exe

    Filesize

    3.0MB

    MD5

    c53d2de8becdaf58caba89a297455c65

    SHA1

    c60da079393025e63475683375e0a045cefa3473

    SHA256

    7d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272

    SHA512

    a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878

  • \Program Files (x86)\LetsSee!\busshost.exe

    Filesize

    377KB

    MD5

    a23a90d17018743ec958d15f1072709a

    SHA1

    5eef3ef9a3cd822ec60a112e17d7591b4c5b96c0

    SHA256

    d4dd209ca0b39e4898ae5650fbd78f086ffb6e6a0092a017ca8a45401f447c49

    SHA512

    525158a88ce1c44e780a0dd9b8ce100a5b7975ea2e9796bea2c3b4ca00886f4a4349ba667ac84e95cbadc6ff54c1ab4bedbe337dddcbf10086977f5071514c94

  • memory/2392-33-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2528-44-0x0000000000570000-0x0000000000578000-memory.dmp

    Filesize

    32KB

  • memory/2528-46-0x0000000000640000-0x0000000000648000-memory.dmp

    Filesize

    32KB

  • memory/2528-37-0x00000000001C0000-0x00000000001CA000-memory.dmp

    Filesize

    40KB

  • memory/2528-38-0x0000000073AC0000-0x00000000741AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2528-39-0x0000000005300000-0x000000000575A000-memory.dmp

    Filesize

    4.4MB

  • memory/2528-40-0x0000000000420000-0x0000000000430000-memory.dmp

    Filesize

    64KB

  • memory/2528-41-0x0000000000430000-0x000000000043A000-memory.dmp

    Filesize

    40KB

  • memory/2528-42-0x00000000004C0000-0x00000000004CA000-memory.dmp

    Filesize

    40KB

  • memory/2528-43-0x0000000000560000-0x000000000056A000-memory.dmp

    Filesize

    40KB

  • memory/2528-35-0x0000000073ACE000-0x0000000073ACF000-memory.dmp

    Filesize

    4KB

  • memory/2528-45-0x0000000000580000-0x000000000058E000-memory.dmp

    Filesize

    56KB

  • memory/2528-36-0x0000000000F90000-0x0000000001298000-memory.dmp

    Filesize

    3.0MB

  • memory/2528-47-0x0000000000650000-0x0000000000658000-memory.dmp

    Filesize

    32KB

  • memory/2528-48-0x0000000000660000-0x0000000000668000-memory.dmp

    Filesize

    32KB

  • memory/2528-49-0x0000000000670000-0x0000000000678000-memory.dmp

    Filesize

    32KB

  • memory/2528-50-0x0000000000870000-0x0000000000878000-memory.dmp

    Filesize

    32KB

  • memory/2528-51-0x0000000000D60000-0x0000000000D68000-memory.dmp

    Filesize

    32KB

  • memory/2528-64-0x0000000073AC0000-0x00000000741AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2528-63-0x0000000073ACE000-0x0000000073ACF000-memory.dmp

    Filesize

    4KB

  • memory/3048-55-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/3048-57-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3048-56-0x0000000000610000-0x0000000000710000-memory.dmp

    Filesize

    1024KB

  • memory/3048-54-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3048-53-0x0000000000610000-0x0000000000710000-memory.dmp

    Filesize

    1024KB