Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
1aa97711314612b3413c935969590bae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1aa97711314612b3413c935969590bae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1aa97711314612b3413c935969590bae_JaffaCakes118.exe
-
Size
693KB
-
MD5
1aa97711314612b3413c935969590bae
-
SHA1
257ebb345989c07bae2b6acddb5bc848d0656bb0
-
SHA256
d59e0a9e77727cec2c7423c014a9c9dbab64fa54dec2e49482b262e00c9756de
-
SHA512
d755954df88b17cad3cf5abaa59e250043e2cc03340c3d7452ddf1da96d132c34ecc9a6caa8ba2dbf4b75cabf91a3f33c519dbbc62f765cc8d85f7c5bdacec2b
-
SSDEEP
12288:Vejv6Ky6XgWqQUElL1Y0UlT52pE/WuJIAu7n7rGPsUFRAp+9ZNN:Vejvg3RLC13UpT+d9yPhRAyNN
Malware Config
Extracted
azorult
http://gess.bit/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Unexpected DNS network traffic destination 17 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 198.206.14.241 Destination IP 130.255.78.223 Destination IP 173.212.234.232 Destination IP 173.249.7.187 Destination IP 46.101.70.183 Destination IP 107.172.42.186 Destination IP 151.80.147.153 Destination IP 91.217.137.44 Destination IP 50.3.82.215 Destination IP 172.98.193.42 Destination IP 192.52.166.110 Destination IP 80.233.248.109 Destination IP 5.45.97.127 Destination IP 82.141.39.32 Destination IP 94.247.43.254 Destination IP 128.52.130.209 Destination IP 162.248.241.94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1aa97711314612b3413c935969590bae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2140 1aa97711314612b3413c935969590bae_JaffaCakes118.exe