Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe
-
Size
305KB
-
MD5
cd64a2387affb043d0c6fa77875172d3
-
SHA1
9034f522d28ec4d7c14d336183020b63191922c0
-
SHA256
42aff50907aff9750d642f923800a2d2436915126dfb93a80b4483912ebd3d77
-
SHA512
37aa181bc695bf8e511858745113d18332f7b93fc61b9d1445e15f9611f0da5acce55a2f5ab83b39ecc76af55831b680d808eb8b3ae6fd7ed8ecc90e0ad42cca
-
SSDEEP
6144:XZABbWqsE/Ao+mv8Qv0LVmwq4FU0fNoy6LYxiMEeNpiSE5DRDaiT1RNlMz:pANwRo+mv8QD4+0V16OhEeni5RNpXlO
Malware Config
Extracted
azorult
http://163.172.172.241/4F88736D-67C9-42B2-B024-3FC0B75F4E71/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4404 AU3_EXE_2018-12-08_20-56.exe 3960 PQwick.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\CompanySmartApp\SmartApp\PQwick.exe cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\CompanySmartApp\SmartApp\AU3_EXE_2018-12-08_20-56.exe cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3696 4404 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AU3_EXE_2018-12-08_20-56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PQwick.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4404 4764 cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe 84 PID 4764 wrote to memory of 4404 4764 cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe 84 PID 4764 wrote to memory of 4404 4764 cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe 84 PID 4764 wrote to memory of 3960 4764 cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe 85 PID 4764 wrote to memory of 3960 4764 cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe 85 PID 4764 wrote to memory of 3960 4764 cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd64a2387affb043d0c6fa77875172d3_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\CompanySmartApp\SmartApp\AU3_EXE_2018-12-08_20-56.exe"C:\Program Files (x86)\CompanySmartApp\SmartApp\AU3_EXE_2018-12-08_20-56.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 14483⤵
- Program crash
PID:3696
-
-
-
C:\Program Files (x86)\CompanySmartApp\SmartApp\PQwick.exe"C:\Program Files (x86)\CompanySmartApp\SmartApp\PQwick.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4404 -ip 44041⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD560640137d87285c627ac0976662abbd9
SHA113ce60604fa5c036ca304811146e7787d3d3e386
SHA2568c52108f1e3f992c9043bbbf84ee4be0e2676d3386876e5af482180f71522a2b
SHA512458584780f38478cf20fb2badfe2ddfa0e790a562a3fa350c5c595ebb83e3439b209a9e022d1df3985fdade22328082fe32999919524f3a5b5deff45dc5a882d
-
Filesize
9KB
MD59f1bfbaa1847fd86468110641203177d
SHA120a9bce11a93fe34a41867c7a9a8690c47f63a7d
SHA256fdc58112eee9720dcf14aa82864ed103c927059350e09c58ed82b40d31c9b04d
SHA5123fa28e51ae3c856b866ea6c720377a33b1651aeaba74c7fbe9a585ba248a5696d8dd36a6f4182ad38d2eb4afcf35362cb4dbe3a7d6591c21e5d944a4c8404134