Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 12:51

General

  • Target

    c3087b45ca582d54e9191f33b5409506_JaffaCakes118.exe

  • Size

    896KB

  • MD5

    c3087b45ca582d54e9191f33b5409506

  • SHA1

    058988ed861e01f489a1931313d1f7b4abee0c1a

  • SHA256

    7b4ed3c690a9d466ddb729d4c806af8d8dffecf85410e31ef845bea4eefd6d17

  • SHA512

    8bd2d44d9ed883e886a3abef6fb11db91a82d3461a7feb0f049cf23d9181b4b3a2e97ed893db0f6ed625b8579d540ac28fb00bfc9c93a5b1a4f9f757e4d9c73c

  • SSDEEP

    24576:pAT8QE+kyYC8rRYyhdYCrTUTebDUki0Vm9:pAI+kdZRvZbDUoVm9

Malware Config

Extracted

Family

azorult

C2

http://23.106.124.148/index.php

Extracted

Family

vidar

Version

18.1

Botnet

543

C2

http://termscenter.com/

Attributes
  • profile_id

    543

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Vidar Stealer 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3087b45ca582d54e9191f33b5409506_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c3087b45ca582d54e9191f33b5409506_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1iB8r7.html
      2⤵
        PID:4412
      • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe
        "C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2240
      • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe
        "C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3732
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" \s C:\Windows\wotsuper.reg
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:3584
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/10f7w3.html
        2⤵
          PID:2380
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3836,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=3844 /prefetch:1
        1⤵
          PID:4820
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=3856,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=3688 /prefetch:1
          1⤵
            PID:2428
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5384,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:8
            1⤵
              PID:1456
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5396,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5452 /prefetch:8
              1⤵
                PID:2668
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=5876,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:1
                1⤵
                  PID:4336
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6196,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=6156 /prefetch:8
                  1⤵
                    PID:2076
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=6152,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:8
                    1⤵
                      PID:4572

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe

                      Filesize

                      531KB

                      MD5

                      942a79c84567438282ac82f675aaf803

                      SHA1

                      7f4cb80d3f36f09c7e598635802afaa9757d76ad

                      SHA256

                      7b02890381fb2641217760706225493b12e3cdaa759be01bcb74b9dfa7dffdec

                      SHA512

                      c8f12ffe6f78c2a0f823f8b5658b6f907a72882aeff5368c733cd524e3c765e7c91931b8778c3485858577770957e2d5c5b529f87463e94fc2d534be3f22e06c

                    • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe

                      Filesize

                      462KB

                      MD5

                      b8c7f57132531317f87259fae9e1ac73

                      SHA1

                      9a116a2e5d40d3ba2384885576ecc830d57f7dfc

                      SHA256

                      461490a3713db75a6474efd8e8f188bdcb8fc46a78372e62eabc89b64d76fbc2

                      SHA512

                      e7f42d9de87e0f24f1016d597e95c9a4a0441f73e6419501a82ab8aac942b50b28c820b2c82f2102e8a65e00624d0082fd03fa301ccb547f0288a78cd4001a9e

                    • C:\Windows\wotsuper.reg

                      Filesize

                      450B

                      MD5

                      42f073434559fb6b9c67aba86de89d1b

                      SHA1

                      9b969de41fc717353619068e46f21ec1db093ab5

                      SHA256

                      03ac69047bce954fdce3d00af881161a073f921d73ff79369e9ee96a109f9eed

                      SHA512

                      b1ae4fb02d7e629f824e084c5cd81e17be3bb37937eed7a1bfcd6aec0fd1cfe9a7299ecfc35958a5d98d11941fc6478e653b69140de02cbec28c4bf0647bd547

                    • memory/2240-58-0x0000000000400000-0x0000000000499000-memory.dmp

                      Filesize

                      612KB

                    • memory/3624-40-0x0000000000400000-0x0000000000433000-memory.dmp

                      Filesize

                      204KB

                    • memory/3732-38-0x0000000000400000-0x0000000000481000-memory.dmp

                      Filesize

                      516KB

                    • memory/3732-41-0x0000000002310000-0x00000000023FC000-memory.dmp

                      Filesize

                      944KB

                    • memory/3732-42-0x0000000000900000-0x0000000000920000-memory.dmp

                      Filesize

                      128KB

                    • memory/3732-59-0x0000000000400000-0x0000000000481000-memory.dmp

                      Filesize

                      516KB