Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe
-
Size
272KB
-
MD5
e70a0a2127982ae79c14bdf5d8134d4a
-
SHA1
b659dc011da0583c308a5a1d39d5bcb27fbc0336
-
SHA256
f570125519d8cfdcc062ca28def97c43066f8ffd1d99e48c9b579ab9a5229dff
-
SHA512
b81e9099eb1c6b027b189f64ae987f08b9ad8491f586142b970ab6f81bd496f6f9a2e2cee4f7b0e4c69ebf9338702b199983b506f1b521b9ff52b322bb35c482
-
SSDEEP
3072:wWEJcSWEJcZsASuf9k7vpB41JzndCbPEBmMD/f3yXGsHImgQWOPaCNaCIfWEJc:wWZSWZRf9kE0bY/fCWsHImSTRxWZ
Malware Config
Extracted
azorult
http://rowv.us/nwama/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
ADVENTRY.exepid process 4676 ADVENTRY.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
mshta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Spaghettis1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ADVENTRY.exe" mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exemshta.exeADVENTRY.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADVENTRY.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exeADVENTRY.exepid process 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe 4676 ADVENTRY.exe 4676 ADVENTRY.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exeADVENTRY.exepid process 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe 4676 ADVENTRY.exe 4676 ADVENTRY.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exeADVENTRY.exepid process 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe 4676 ADVENTRY.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exedescription pid process target process PID 5056 wrote to memory of 764 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe mshta.exe PID 5056 wrote to memory of 764 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe mshta.exe PID 5056 wrote to memory of 764 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe mshta.exe PID 5056 wrote to memory of 4676 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe ADVENTRY.exe PID 5056 wrote to memory of 4676 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe ADVENTRY.exe PID 5056 wrote to memory of 4676 5056 e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe ADVENTRY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e70a0a2127982ae79c14bdf5d8134d4a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscript:Execute(" str1 = ""WScript.Shell"" : str2 = ""Set WshShell = CrXXteObject(str1)"" : str2 = Replace(str2,""XX"",""ea"") : execute str2 : myKey = ""HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Spaghettis1"" : WshShell.RegWrite myKey,""C:\Users\Admin\AppData\Local\Temp\ADVENTRY.exe"",""REG_SZ"" : window.close")2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\ADVENTRY.exe"C:\Users\Admin\AppData\Local\Temp\ADVENTRY.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5056c8da79521204591fa908948c3ccd1
SHA1113f2e915224ed1af9f4de6c8fb8ae724b26ec95
SHA25664dec3e4c11c493496bf37afbd1c249f189bdb4993bcf0cb7b662b457bf079a4
SHA5126142971f461cf57428de28770c080add6caf39bc5a04dd2c62eecda24284196a3e14bd29abc66eb510098d6e49648ddf9d5e833711edb746b67abb25b2cbae98