Overview
overview
10Static
static
10intro.exe
windows7-x64
1intro.exe
windows10-2004-x64
1keygen-pr.exe
windows7-x64
1keygen-pr.exe
windows10-2004-x64
1keygen-step-1.exe
windows7-x64
10keygen-step-1.exe
windows10-2004-x64
10keygen-step-3.exe
windows7-x64
7keygen-step-3.exe
windows10-2004-x64
1keygen-step-4.exe
windows7-x64
10keygen-step-4.exe
windows10-2004-x64
10keygen.bat
windows7-x64
10keygen.bat
windows10-2004-x64
10user32.dll
windows10-2004-x64
1General
-
Target
39c5ea241fa0aed95ea39cbb933526d8_JaffaCakes118
-
Size
10.0MB
-
Sample
240711-tafa3stbrq
-
MD5
39c5ea241fa0aed95ea39cbb933526d8
-
SHA1
a68e1b83880dedbf928b4c2c98589f15cca5095e
-
SHA256
693883c68fc9fd236ff5e63c81c01a0ba5ffa60360c4db1c125c5094bbce68fa
-
SHA512
481c11b36fc5983b35b567a2d1270a677d4ebe78432210001ac19c393b195a191dc3238f02041becb1b86d8d0f2a97095a62882766cf0077df80938a325e5a2e
-
SSDEEP
196608:wxN8BUsNXpwd/HSznBUwJhx2S8LwqDWJEYUvUF/P5chhPtSgx2:cMXpwJHSzBR2S8LvYOggx2
Behavioral task
behavioral1
Sample
intro.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
intro.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
keygen-pr.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
keygen-pr.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
keygen-step-1.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
keygen-step-1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
keygen-step-3.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
keygen-step-3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
keygen-step-4.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
keygen-step-4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
keygen.bat
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
keygen.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
user32.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
ffdroider
http://101.36.107.74
Targets
-
-
Target
intro.exe
-
Size
144KB
-
MD5
573a20aa042eede54472fb6140bdee70
-
SHA1
3de8cba60af02e6c687f6312edcb176d897f7d81
-
SHA256
2ecebded4848d7ebf8cfc435fafe324c593fe4acec71866730acecd50c1109c3
-
SHA512
86e84be2d2b5548e72545bd374221dfa9940254cc1dcee016b52a2207c139bd0782ab712174c4dd7cfa49351360cfb124fe3bfbdd8ee45cd9ac735deb4864664
-
SSDEEP
3072:JAJxsr//OHTE/CJ+juuVSpiVyzwLe/Nv0s:C3FJKuuV+lv0s
Score1/10 -
-
-
Target
keygen-pr.exe
-
Size
1.7MB
-
MD5
65b49b106ec0f6cf61e7dc04c0a7eb74
-
SHA1
a1f4784377c53151167965e0ff225f5085ebd43b
-
SHA256
862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
-
SHA512
e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
SSDEEP
49152:Apala5CynDWWmQm2qUhwLlwKeHqDDyz1v/1:AOHynDWWNPqM5KEr1
Score1/10 -
-
-
Target
keygen-step-1.exe
-
Size
112KB
-
MD5
c615d0bfa727f494fee9ecb3f0acf563
-
SHA1
6c3509ae64abc299a7afa13552c4fe430071f087
-
SHA256
95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
-
SHA512
d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
SSDEEP
3072:KExRaX6raoCoCyz6/mqv1JR+yBtGOeaeWgiZq:faZ1tme++wio
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
-
-
Target
keygen-step-3.exe
-
Size
677KB
-
MD5
19f48cb45e4dcc1fe8470d5d76a16df4
-
SHA1
586db9e14a24a0719db0c7ae15b8e7e4e328a80b
-
SHA256
5971f27578f7a5d0f309a77148c431f78e6971cb0f1506c319432307471d3c80
-
SHA512
09987d7cf6dcd7e16c7ab183947f5853dfc3a977777d237761fc94a5f7f6b19fa2ea9a3a532e7e090b4d85685528fbc1095c2854e35cbd9beafc385a7d898762
-
SSDEEP
12288:UvIHCq2LGyiEdJWPRrMzIzZibsTj9MlvFF1QRpwPZn1WENRR9TqmLtWxTmO++NM:Ut5YRxUoTj9yvr1QRp4n1BRPTqHC+N
Score7/10-
Deletes itself
-
-
-
Target
keygen-step-4.exe
-
Size
7.6MB
-
MD5
1770a7731a4ea1030149e7f05cff1705
-
SHA1
02868a443c1864bb0afbe0832545736bd538028f
-
SHA256
3bd0eb640c37fb31423b560aeb5bf4f9f6117cb60c2a9e4509b7a0db80e0a092
-
SHA512
eec736c11084a6a066c2767ebbd1d4f06b6cfb4524450ca19bd8f9c743725545c7559f45e03aa5287732be9d35dbd72e80dfbd4bcdb810abd70bfc5b2ac00fe7
-
SSDEEP
196608:K90XryNC3HMcOrcX4MPIJe9A1eGL+pieBJPE11ExWR:1iUDX4MQwA1PCpiey11Z
-
Detect Fabookie payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
keygen.bat
-
Size
146B
-
MD5
98ee725f76d72ee9e9899a3fab9ba23b
-
SHA1
45c34541a5b0aa0bb99043f6c39f49605ec4ebd8
-
SHA256
ce6afc9a209c23efea91c9ce412abd19b882c1b3ac93fd26ed746eb05aebf2ff
-
SHA512
369176b70962b18910fcbb876945873fcfb9bb251e845e3e601d38b38f3998c1808f45796be01eb5a6ccc585b2533bcf2c4d1d3e2fc63fd4fabba31e3b8c5b06
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect Fabookie payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
user32.dll
-
Size
1.6MB
-
MD5
634fbe95ea4ef2e799b3d117dd9ec52e
-
SHA1
09533551abefbc922b87d1c2553329abd328c387
-
SHA256
1ba4bc4f000dd9263307357ffa42d83eb01f59bf28aec16ef2eb74e24683412e
-
SHA512
7d3857623c2d6806ed56e436fba2aa72ee57978ed8261894c3d7bb97a9f747d87866ca1dfaa2bc21ea22de1544fe7daf223565b7f16d894d02219ea9a690b7cf
-
SSDEEP
24576:77hFCFHT0vzImKVsVzuJJBwuCx59U4IgL5pz1:P6STzwJBwuOTU4Ia1
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1