Malware Analysis Report

2024-08-06 13:36

Sample ID 240618-qf4zvaygnp
Target bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118
SHA256 ad9093633b9ecaeea7bff69ab8d8781213fec82db6c7f2e963a40d2e0ee0e9ce
Tags
azorult discovery infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ad9093633b9ecaeea7bff69ab8d8781213fec82db6c7f2e963a40d2e0ee0e9ce

Threat Level: Known bad

The file bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

azorult discovery infostealer trojan

Azorult

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Checks installed software on the system

Drops file in Program Files directory

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Checks processor information in registry

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 13:13

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 13:13

Reported

2024-06-18 13:15

Platform

win7-20231129-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Checks installed software on the system

discovery

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2392 wrote to memory of 3048 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2392 wrote to memory of 3048 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2392 wrote to memory of 3048 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2392 wrote to memory of 3048 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2392 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2392 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2392 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2392 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2528 wrote to memory of 1072 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2528 wrote to memory of 1072 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2528 wrote to memory of 1072 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2528 wrote to memory of 1072 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1180

Network

Country Destination Domain Proto
RU 92.63.192.72:80 92.63.192.72 tcp
US 8.8.8.8:53 istats.club udp

Files

\Program Files (x86)\LetsSee!\busshost.exe

MD5 a23a90d17018743ec958d15f1072709a
SHA1 5eef3ef9a3cd822ec60a112e17d7591b4c5b96c0
SHA256 d4dd209ca0b39e4898ae5650fbd78f086ffb6e6a0092a017ca8a45401f447c49
SHA512 525158a88ce1c44e780a0dd9b8ce100a5b7975ea2e9796bea2c3b4ca00886f4a4349ba667ac84e95cbadc6ff54c1ab4bedbe337dddcbf10086977f5071514c94

\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 c53d2de8becdaf58caba89a297455c65
SHA1 c60da079393025e63475683375e0a045cefa3473
SHA256 7d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512 a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878

memory/2392-33-0x0000000000400000-0x0000000000435000-memory.dmp

memory/2528-35-0x0000000073ACE000-0x0000000073ACF000-memory.dmp

memory/2528-36-0x0000000000F90000-0x0000000001298000-memory.dmp

memory/2528-37-0x00000000001C0000-0x00000000001CA000-memory.dmp

memory/2528-38-0x0000000073AC0000-0x00000000741AE000-memory.dmp

memory/2528-39-0x0000000005300000-0x000000000575A000-memory.dmp

memory/2528-40-0x0000000000420000-0x0000000000430000-memory.dmp

memory/2528-41-0x0000000000430000-0x000000000043A000-memory.dmp

memory/2528-42-0x00000000004C0000-0x00000000004CA000-memory.dmp

memory/2528-43-0x0000000000560000-0x000000000056A000-memory.dmp

memory/2528-44-0x0000000000570000-0x0000000000578000-memory.dmp

memory/2528-45-0x0000000000580000-0x000000000058E000-memory.dmp

memory/2528-46-0x0000000000640000-0x0000000000648000-memory.dmp

memory/2528-47-0x0000000000650000-0x0000000000658000-memory.dmp

memory/2528-48-0x0000000000660000-0x0000000000668000-memory.dmp

memory/2528-49-0x0000000000670000-0x0000000000678000-memory.dmp

memory/2528-50-0x0000000000870000-0x0000000000878000-memory.dmp

memory/2528-51-0x0000000000D60000-0x0000000000D68000-memory.dmp

memory/3048-53-0x0000000000610000-0x0000000000710000-memory.dmp

memory/3048-54-0x0000000000400000-0x0000000000420000-memory.dmp

memory/3048-55-0x0000000000400000-0x0000000000474000-memory.dmp

memory/3048-57-0x0000000000400000-0x0000000000420000-memory.dmp

memory/3048-56-0x0000000000610000-0x0000000000710000-memory.dmp

memory/2528-63-0x0000000073ACE000-0x0000000073ACF000-memory.dmp

memory/2528-64-0x0000000073AC0000-0x00000000741AE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 13:13

Reported

2024-06-18 13:15

Platform

win10v2004-20240611-en

Max time kernel

95s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Checks installed software on the system

discovery

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\bc1dddf042ec8cadfcd803a03edd23ee_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3936 -ip 3936

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 1600

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5032 -ip 5032

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 1252

Network

Country Destination Domain Proto
US 8.8.8.8:53 istats.club udp
US 8.8.8.8:53 85.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
RU 92.63.192.72:80 92.63.192.72 tcp
US 8.8.8.8:53 72.192.63.92.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

C:\Program Files (x86)\LetsSee!\busshost.exe

MD5 a23a90d17018743ec958d15f1072709a
SHA1 5eef3ef9a3cd822ec60a112e17d7591b4c5b96c0
SHA256 d4dd209ca0b39e4898ae5650fbd78f086ffb6e6a0092a017ca8a45401f447c49
SHA512 525158a88ce1c44e780a0dd9b8ce100a5b7975ea2e9796bea2c3b4ca00886f4a4349ba667ac84e95cbadc6ff54c1ab4bedbe337dddcbf10086977f5071514c94

memory/4928-36-0x0000000000400000-0x0000000000435000-memory.dmp

C:\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 c53d2de8becdaf58caba89a297455c65
SHA1 c60da079393025e63475683375e0a045cefa3473
SHA256 7d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512 a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878

memory/3936-38-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

memory/3936-39-0x0000000000990000-0x0000000000C98000-memory.dmp

memory/3936-40-0x00000000054A0000-0x00000000054AA000-memory.dmp

memory/3936-41-0x0000000074CB0000-0x0000000075460000-memory.dmp

memory/3936-42-0x0000000005770000-0x0000000005BCA000-memory.dmp

memory/3936-43-0x0000000005560000-0x0000000005570000-memory.dmp

memory/3936-45-0x0000000005590000-0x000000000559A000-memory.dmp

memory/3936-44-0x0000000005570000-0x000000000557A000-memory.dmp

memory/3936-49-0x0000000005700000-0x0000000005708000-memory.dmp

memory/3936-48-0x00000000056C0000-0x00000000056CE000-memory.dmp

memory/3936-47-0x00000000056E0000-0x00000000056E8000-memory.dmp

memory/3936-46-0x00000000056D0000-0x00000000056DA000-memory.dmp

memory/3936-50-0x0000000005710000-0x0000000005718000-memory.dmp

memory/3936-51-0x0000000005720000-0x0000000005728000-memory.dmp

memory/3936-52-0x0000000005740000-0x0000000005748000-memory.dmp

memory/3936-54-0x0000000005760000-0x0000000005768000-memory.dmp

memory/3936-53-0x0000000005750000-0x0000000005758000-memory.dmp

memory/3936-55-0x0000000074CB0000-0x0000000075460000-memory.dmp

memory/5032-57-0x0000000000790000-0x0000000000890000-memory.dmp

memory/5032-58-0x0000000000400000-0x0000000000420000-memory.dmp

memory/5032-59-0x0000000000400000-0x0000000000474000-memory.dmp

memory/5032-60-0x0000000000400000-0x0000000000420000-memory.dmp