Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe
-
Size
543KB
-
MD5
2be7e32b1c4e175237eed1e23e150b7c
-
SHA1
56c3c3013cfc68aa1705d240fc6caacdede33c69
-
SHA256
b686ad44c1a404d73526de4fabdee6a36f5504b466b172ab62661d0359961f09
-
SHA512
4038049d60442f7abcbcead224889c6b51d127003e52199d1108fd23b881da94407c0c2e09713c543682a6a857696001aeaee0f40f6b0793dedd4c46bc153616
-
SSDEEP
12288:FL92LR2WuX3wgKO7M+S+DufgXLl5KLmY8c9JSzeaczubiwmc:D2l2dEp+DufgXLlsqYJS/aUiw9
Malware Config
Extracted
azorult
interbizservices.eu/panel/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
project67654.exeproject67654.exepid process 2868 project67654.exe 2576 project67654.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2740 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
project67654.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\Desktop\\project67654.exe -boot" project67654.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
project67654.exedescription pid process target process PID 2868 set thread context of 2576 2868 project67654.exe project67654.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeproject67654.exeproject67654.exe2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language project67654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language project67654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exeproject67654.exedescription pid process Token: SeDebugPrivilege 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe Token: SeDebugPrivilege 2868 project67654.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.execmd.exeproject67654.exedescription pid process target process PID 2888 wrote to memory of 2820 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2820 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2820 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2820 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2740 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2740 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2740 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2740 2888 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2868 2740 cmd.exe project67654.exe PID 2740 wrote to memory of 2868 2740 cmd.exe project67654.exe PID 2740 wrote to memory of 2868 2740 cmd.exe project67654.exe PID 2740 wrote to memory of 2868 2740 cmd.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe PID 2868 wrote to memory of 2576 2868 project67654.exe project67654.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe" "C:\Users\Admin\Desktop\project67654.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\Desktop\project67654.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\Desktop\project67654.exe"C:\Users\Admin\Desktop\project67654.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\Desktop\project67654.exe"C:\Users\Admin\Desktop\project67654.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD52be7e32b1c4e175237eed1e23e150b7c
SHA156c3c3013cfc68aa1705d240fc6caacdede33c69
SHA256b686ad44c1a404d73526de4fabdee6a36f5504b466b172ab62661d0359961f09
SHA5124038049d60442f7abcbcead224889c6b51d127003e52199d1108fd23b881da94407c0c2e09713c543682a6a857696001aeaee0f40f6b0793dedd4c46bc153616