Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe
-
Size
675KB
-
MD5
0c86c579bc63a51639e950e3449691b0
-
SHA1
29b1f8e35588c0fbf8e7a31847e60fe3ca525786
-
SHA256
f6b7e42150aea95c6af1e8c570ca45fac6e7e7dc2b27a88cae25fbc92faa07ff
-
SHA512
e57a8bb805df1a0a13cb33fd1208233cfe405ad93d2b887452ddff09fd7b1b55ba1a86ad9e0fe9a29e34ef66cd06ddb8e1a23ba79159663369af63c0e8025faa
-
SSDEEP
12288:WOL2EC+KNAlnSVi4dVNkKQqdiuV7a+u9LjyXahGZ3KIpWjV:WGRYAlnG7T9V7a71j8oW1pa
Malware Config
Extracted
azorult
http://ciuj.ir/arnold/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2752 2280 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2280 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2280 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2752 2280 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe 28 PID 2280 wrote to memory of 2752 2280 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe 28 PID 2280 wrote to memory of 2752 2280 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe 28 PID 2280 wrote to memory of 2752 2280 0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c86c579bc63a51639e950e3449691b0_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2752
-