Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 09:39

General

  • Target

    ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe

  • Size

    626KB

  • MD5

    ef8481de1b7ae881dea23cf177aa8c07

  • SHA1

    ac02c0e8a8b6120df1faa5dc7650fbca39914cc3

  • SHA256

    87dd7116fceeed579d9ec1e3db66e4395021cbb04256cf091a23da97703b0aa5

  • SHA512

    ea064b42f7149aeee517dcf0b17cc4cfe741a642e5fe91dc912eac720adb8d812ba205c9864083bd8acd86fe840157852f54c5bb9dfd1e1e9771ba9d0728079d

  • SSDEEP

    12288:VWcp8wkfBN7LLf50z1S2a3wq4llPsBKsrGFXFAWpgUmRNfyj3:McGfDxO2/4l506FXKfyj

Malware Config

Extracted

Family

azorult

C2

http://abscete.info/rnest/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef8481de1b7ae881dea23cf177aa8c07_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Users\Admin\AppData\Local\TVcard.exe
      "C:\Users\Admin\AppData\Local\TVcard.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Users\Admin\AppData\Local\TVcard.exe
        "C:\Users\Admin\AppData\Local\TVcard.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\F.bmp

    Filesize

    399KB

    MD5

    b74ffdc896b09717948feb089db9ff60

    SHA1

    972d6112944580bf2ce61349d98829f0eeeb4990

    SHA256

    844d19b8de460cac9cf860bb0c8b48d7db87d7463f9ad1f6b788d1a8b7625fcf

    SHA512

    aecc53d79f55cbb002f9706134074ef163ddbcd59152f7c8dcd34c67c68130c168a5bbec5ba07e1bd59f6382455e3591bba6f72bebac76ca1b08ea50ce51b703

  • C:\Users\Admin\AppData\Local\TVcard.exe

    Filesize

    89KB

    MD5

    189ce270d71588bf34ea0ece0f8d3d1e

    SHA1

    06665bfdf86209b8c4dc00f3a19f01379919a6fc

    SHA256

    9ef0992833468166d8c1774e1ab4808b094d7cf026dacfb760159336385ff4ab

    SHA512

    e64a8a755b1c052adddb04d99fc7464a6029012d954a645334cc5ca806f1183984878c141df596ab5e7843ba762da7c6da19bc621fef8722c03bc26e15d86915

  • memory/716-15-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/716-19-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/716-21-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/716-22-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3268-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3844-0-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB

  • memory/3844-1-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/3844-12-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB