Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe
-
Size
543KB
-
MD5
2be7e32b1c4e175237eed1e23e150b7c
-
SHA1
56c3c3013cfc68aa1705d240fc6caacdede33c69
-
SHA256
b686ad44c1a404d73526de4fabdee6a36f5504b466b172ab62661d0359961f09
-
SHA512
4038049d60442f7abcbcead224889c6b51d127003e52199d1108fd23b881da94407c0c2e09713c543682a6a857696001aeaee0f40f6b0793dedd4c46bc153616
-
SSDEEP
12288:FL92LR2WuX3wgKO7M+S+DufgXLl5KLmY8c9JSzeaczubiwmc:D2l2dEp+DufgXLlsqYJS/aUiw9
Malware Config
Extracted
azorult
interbizservices.eu/panel/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
project67654.exeproject67654.exepid process 4212 project67654.exe 1080 project67654.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
project67654.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\Desktop\\project67654.exe -boot" project67654.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
project67654.exedescription pid process target process PID 4212 set thread context of 1080 4212 project67654.exe project67654.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeproject67654.exeproject67654.exe2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language project67654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language project67654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exeproject67654.exedescription pid process Token: SeDebugPrivilege 2396 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe Token: SeDebugPrivilege 4212 project67654.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.execmd.exeproject67654.exedescription pid process target process PID 2396 wrote to memory of 2004 2396 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2396 wrote to memory of 2004 2396 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2396 wrote to memory of 2004 2396 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2396 wrote to memory of 884 2396 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2396 wrote to memory of 884 2396 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 2396 wrote to memory of 884 2396 2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe cmd.exe PID 884 wrote to memory of 4212 884 cmd.exe project67654.exe PID 884 wrote to memory of 4212 884 cmd.exe project67654.exe PID 884 wrote to memory of 4212 884 cmd.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe PID 4212 wrote to memory of 1080 4212 project67654.exe project67654.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\2be7e32b1c4e175237eed1e23e150b7c_JaffaCakes118.exe" "C:\Users\Admin\Desktop\project67654.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\Desktop\project67654.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\Desktop\project67654.exe"C:\Users\Admin\Desktop\project67654.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\Desktop\project67654.exe"C:\Users\Admin\Desktop\project67654.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD52be7e32b1c4e175237eed1e23e150b7c
SHA156c3c3013cfc68aa1705d240fc6caacdede33c69
SHA256b686ad44c1a404d73526de4fabdee6a36f5504b466b172ab62661d0359961f09
SHA5124038049d60442f7abcbcead224889c6b51d127003e52199d1108fd23b881da94407c0c2e09713c543682a6a857696001aeaee0f40f6b0793dedd4c46bc153616