Overview
overview
10Static
static
314882f903f...18.exe
windows7-x64
1014882f903f...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/sponsor.dll
windows7-x64
3$TEMP/sponsor.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/sponsor.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/sponsor.dll
Resource
win10v2004-20240802-en
General
-
Target
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe
-
Size
285KB
-
MD5
14882f903f963d5b5231a7aeed89ab81
-
SHA1
f50906412745431d42f6eaea9715bbe6da5a06c3
-
SHA256
bbf94071bf2d7407c3f533faa638927988253bf8667394a11441fb3764bcadbc
-
SHA512
2afea87506bbf6829c3877063e5928aab6012c3581a6ef50aa742d035bd83974e7d674b53d0b4d447f7272e73aded541862980a96904b7ae17125fae36716fc5
-
SSDEEP
6144:x5aOGGSp2m3OHdIvDB+omwgX2JB8677Uzn1mSkEu5ZMLHn:iOGGo3OHdotGG/lkxHH0ZMLH
Malware Config
Extracted
azorult
http://kkrudy.com/za/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL 2 IoCs
Processes:
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exepid process 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\win.ini 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exenslookup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exepid process 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exepid process 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exedescription pid process target process PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe PID 2520 wrote to memory of 2588 2520 14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517B
MD5893cae59ab5945a94a7da007d47a1255
SHA1d4cfd81c6647ca64022bd307c08a7fb4bbbd4c06
SHA256edfa0f2d3bea9f737e0315971c6f81d3d8e7d460b60a19351ada0316a093c938
SHA512d66e454781f54f45df814ad32d687b0f100578c2a4ffca62de81add04281fb881a550702bd2d058933d3736d14e88624af268a86ce24b0c3935242b206ffdcc9
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
Filesize
9KB
MD56e17b30ff21d147b4b11329b0e88d0f7
SHA1f3dfbdc3966ec9b8d1df73c14c7617843dcc507c
SHA2567ff10984f4cb404b2f91b7d5053b85055435b321b23e96302640250740ee8fbe
SHA51291f135dbfccec48867e12e6e5b87f82b8268ee55252c3d75c5d96bba96c03b722bb805a27b64ca2f5d09afa27943f7b80a5a33c153a9dbc17f1c057fc20bc8a7