Analysis

  • max time kernel
    95s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 23:54

General

  • Target

    916522d824b2c07ad6c3cdfc2a0e8cfd_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    916522d824b2c07ad6c3cdfc2a0e8cfd

  • SHA1

    b1a18537d9bd5791c74814eb3cdfd2fe76859e25

  • SHA256

    63dfc96eb2d9a97481ad6bc19b62a0aa04891cbaf60257038649b4116c50780e

  • SHA512

    ed5474897f85a057203bb8af2df986231085e1e06cc30ac5607f3cc6bcfd33854ee4835ee58cf9ca35940353cf7590b34c4af7379d7b2c4092540ddd7f27bc0c

  • SSDEEP

    24576:Mtb20pkaCqT5TBWgNQ7agAZQxYZV4RRAqL16A:1Vg5tQ7agg0YpC5

Malware Config

Extracted

Family

azorult

C2

http://max.u8f3e5jq.ru/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Azorult family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\916522d824b2c07ad6c3cdfc2a0e8cfd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\916522d824b2c07ad6c3cdfc2a0e8cfd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Users\Admin\AppData\Local\Temp\916522d824b2c07ad6c3cdfc2a0e8cfd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\916522d824b2c07ad6c3cdfc2a0e8cfd_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aut7E58.tmp

    Filesize

    112KB

    MD5

    71651e66f63ca82f977e09112839d16a

    SHA1

    86e6299fcc38e0259aebce1c8d15ecf530674a8a

    SHA256

    7f6abc17197aaea6d923a23f938321d7ea3b30d4fa15f7b79a3a13d4a27eb0f0

    SHA512

    c9556f4ed67e4ebbcf753491249a997f5a63475a5278ac8b77174641fb2d73cc19472c005dbc4a9394613084b58a505b7add72706290b3ecae4e6c4e6480bebe

  • memory/3128-9-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3128-11-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3128-12-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3128-13-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3628-8-0x0000000003680000-0x0000000003683000-memory.dmp

    Filesize

    12KB