Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
d733f2e3f5b6925b7a57d52592f2cdc9
-
SHA1
d884741c23e51405af75fedd296b5a5788e432f1
-
SHA256
7efd2936ffd94ab1fabf989fd75cb0f54253ce1950fe6bee4168b230c39e15cc
-
SHA512
39c57209d89e9460222227099b1272ba49b29bd4a9cb31ff096cbeeae1812bc1a03f7086c24124cb83330aa23b216dc5ec62b04f38802eeee53801e0a92b66d7
-
SSDEEP
98304:1AI+bekwfoM38+Y845C7ZloybZpE0CsJ91E8Ej5ehitYnL:mtb1MMz84M7ZW0Csv1M5duL
Malware Config
Extracted
azorult
http://194.32.78.34/inc/d/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lsync.exe -
Executes dropped EXE 4 IoCs
pid Process 4484 busshost.exe 4272 YTLoader.exe 1668 lsync.exe 3412 attachmentphoto.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1668-84-0x0000000000400000-0x0000000000521000-memory.dmp autoit_exe behavioral2/memory/3412-118-0x0000000000400000-0x0000000000521000-memory.dmp autoit_exe behavioral2/memory/3412-120-0x0000000000400000-0x0000000000521000-memory.dmp autoit_exe behavioral2/memory/3412-122-0x0000000000400000-0x0000000000521000-memory.dmp autoit_exe behavioral2/memory/3412-125-0x0000000000400000-0x0000000000521000-memory.dmp autoit_exe behavioral2/memory/3412-127-0x0000000000400000-0x0000000000521000-memory.dmp autoit_exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LetsSee!\lsync.exe d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe File created C:\Program Files (x86)\LetsSee!\Uninstall.ini d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1736 4272 WerFault.exe 87 3324 1668 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attachmentphoto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language busshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YTLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4932 cmd.exe 1868 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 YTLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString YTLoader.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS YTLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer YTLoader.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1868 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3844 schtasks.exe 1620 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4272 YTLoader.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2552 wrote to memory of 4484 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 86 PID 2552 wrote to memory of 4484 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 86 PID 2552 wrote to memory of 4484 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 86 PID 2552 wrote to memory of 4272 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 87 PID 2552 wrote to memory of 4272 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 87 PID 2552 wrote to memory of 4272 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 87 PID 2552 wrote to memory of 1668 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 88 PID 2552 wrote to memory of 1668 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 88 PID 2552 wrote to memory of 1668 2552 d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe 88 PID 1668 wrote to memory of 3412 1668 lsync.exe 100 PID 1668 wrote to memory of 3412 1668 lsync.exe 100 PID 1668 wrote to memory of 3412 1668 lsync.exe 100 PID 1668 wrote to memory of 4932 1668 lsync.exe 101 PID 1668 wrote to memory of 4932 1668 lsync.exe 101 PID 1668 wrote to memory of 4932 1668 lsync.exe 101 PID 4932 wrote to memory of 1868 4932 cmd.exe 105 PID 4932 wrote to memory of 1868 4932 cmd.exe 105 PID 4932 wrote to memory of 1868 4932 cmd.exe 105 PID 3412 wrote to memory of 3092 3412 attachmentphoto.exe 107 PID 3412 wrote to memory of 3092 3412 attachmentphoto.exe 107 PID 3412 wrote to memory of 3092 3412 attachmentphoto.exe 107 PID 3412 wrote to memory of 1444 3412 attachmentphoto.exe 108 PID 3412 wrote to memory of 1444 3412 attachmentphoto.exe 108 PID 3412 wrote to memory of 1444 3412 attachmentphoto.exe 108 PID 3092 wrote to memory of 1620 3092 cmd.exe 111 PID 3092 wrote to memory of 1620 3092 cmd.exe 111 PID 3092 wrote to memory of 1620 3092 cmd.exe 111 PID 1444 wrote to memory of 3844 1444 cmd.exe 112 PID 1444 wrote to memory of 3844 1444 cmd.exe 112 PID 1444 wrote to memory of 3844 1444 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\LetsSee!\busshost.exe"C:\Program Files (x86)\LetsSee!\busshost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Program Files (x86)\LetsSee!\YTLoader.exe"C:\Program Files (x86)\LetsSee!\YTLoader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 16083⤵
- Program crash
PID:1736
-
-
-
C:\Program Files (x86)\LetsSee!\lsync.exe"C:\Program Files (x86)\LetsSee!\lsync.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exeC:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c SchTasks /create /SC MINUTE /TN 7ZipUnis /TR C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\volumfix.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\schtasks.exeSchTasks /create /SC MINUTE /TN 7ZipUnis /TR C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\volumfix.exe5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c SchTasks /create /SC HOURLY /TN FlashServis /TR C:\ProgramData\FlashSys\CurlMSI.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\schtasks.exeSchTasks /create /SC HOURLY /TN FlashServis /TR C:\ProgramData\FlashSys\CurlMSI.exe5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3844
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Program Files (x86)\LetsSee!\lsync.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\PING.EXEping -n 2 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 9963⤵
- Program crash
PID:3324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4272 -ip 42721⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1668 -ip 16681⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5bfc8ddeea83b06dd1df8df2e5b963eb6
SHA145202981bc2c4f89f894ec8f83652a656a02a4bb
SHA2560a30576ef2d68859a3d7ac821b7e44a6a15a0b79ec04810849cb8c38814d1cbe
SHA512c86ff9a2fb47f83d6ab76bda577204699e37687cc8b13bc731d95a0f6c5f5e6d4b383cbaed6bbceb21ceee68200d7f51adc311b9a3f1c82af96fee073fb211d6
-
Filesize
685KB
MD520776e42372343ae9da1957918d3f04f
SHA18c3d4a93e5569c70aaa6e5b03f0b0bc5a872d9ba
SHA2561c3aeee4a07fb36f4f0b2efd73d777ba5da1e445495c2f0af30c7db54a31acc6
SHA5125463499b54f2ef032ee65d68175ba75a7e1c68730fe888c167dc1de812807037b8d7bd435fb2d0f4e75050a609d0849ef8c70fa5084580d0b84c29e623bbd1f9
-
Filesize
1.0MB
MD51ef706b65186fb31cf5b51c119c9638e
SHA1c52256ef863eda1708502b047f0ed79c9d95463a
SHA256cb9ac953fc9e459ab52d6baa8ff78610b82da3db64b235493e7b1d64e0437c00
SHA512dd4d72336004e09887d64739a2c2a297025692902ef7561cd13c24d5d57658d0d328b2521e4f89f0f10856236788bd40dbedc9cf643d838ab4097d41c7529460
-
Filesize
198B
MD5dfa5ef6c4753dad658e3324b392a0f3e
SHA1f7c2311a2eb2fd7a6a981c988fb32307589f7184
SHA2563254edd27db631f0b796b444670cc9ac93bd8ca82da87ca1f94e09364a60d59c
SHA512f96ae5bdd08d9b869ea94574b09b99e5d55127e588ecf5242254d47835a178c43870addabd67663d243f44270b2a2a8c122473de40c2d3840ce11e6ae400690a