Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 09:39
Behavioral task
behavioral1
Sample
ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe
-
Size
626KB
-
MD5
ef8481de1b7ae881dea23cf177aa8c07
-
SHA1
ac02c0e8a8b6120df1faa5dc7650fbca39914cc3
-
SHA256
87dd7116fceeed579d9ec1e3db66e4395021cbb04256cf091a23da97703b0aa5
-
SHA512
ea064b42f7149aeee517dcf0b17cc4cfe741a642e5fe91dc912eac720adb8d812ba205c9864083bd8acd86fe840157852f54c5bb9dfd1e1e9771ba9d0728079d
-
SSDEEP
12288:VWcp8wkfBN7LLf50z1S2a3wq4llPsBKsrGFXFAWpgUmRNfyj3:McGfDxO2/4l506FXKfyj
Malware Config
Extracted
azorult
http://abscete.info/rnest/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
TVcard.exeTVcard.exepid process 2760 TVcard.exe 2680 TVcard.exe -
Loads dropped DLL 3 IoCs
Processes:
ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exeTVcard.exepid process 2240 ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe 2240 ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe 2760 TVcard.exe -
Processes:
resource yara_rule behavioral1/memory/2240-0-0x0000000000400000-0x0000000000542000-memory.dmp upx behavioral1/memory/2240-12-0x0000000000400000-0x0000000000542000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
TVcard.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mozilla = "C:\\Users\\Admin\\AppData\\Local\\Mozilla\\StatsReader.exe" TVcard.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TVcard.exedescription pid process target process PID 2760 set thread context of 2680 2760 TVcard.exe TVcard.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exeTVcard.exeTVcard.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TVcard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TVcard.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exeTVcard.exedescription pid process target process PID 2240 wrote to memory of 2760 2240 ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe TVcard.exe PID 2240 wrote to memory of 2760 2240 ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe TVcard.exe PID 2240 wrote to memory of 2760 2240 ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe TVcard.exe PID 2240 wrote to memory of 2760 2240 ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe PID 2760 wrote to memory of 2680 2760 TVcard.exe TVcard.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\TVcard.exe"C:\Users\Admin\AppData\Local\TVcard.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\TVcard.exe"C:\Users\Admin\AppData\Local\TVcard.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5b74ffdc896b09717948feb089db9ff60
SHA1972d6112944580bf2ce61349d98829f0eeeb4990
SHA256844d19b8de460cac9cf860bb0c8b48d7db87d7463f9ad1f6b788d1a8b7625fcf
SHA512aecc53d79f55cbb002f9706134074ef163ddbcd59152f7c8dcd34c67c68130c168a5bbec5ba07e1bd59f6382455e3591bba6f72bebac76ca1b08ea50ce51b703
-
Filesize
89KB
MD5189ce270d71588bf34ea0ece0f8d3d1e
SHA106665bfdf86209b8c4dc00f3a19f01379919a6fc
SHA2569ef0992833468166d8c1774e1ab4808b094d7cf026dacfb760159336385ff4ab
SHA512e64a8a755b1c052adddb04d99fc7464a6029012d954a645334cc5ca806f1183984878c141df596ab5e7843ba762da7c6da19bc621fef8722c03bc26e15d86915