Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 07:12

General

  • Target

    11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe

  • Size

    273KB

  • MD5

    11a185f3d35d037f30042970bb2a2926

  • SHA1

    b0849a84c5b0f73d8504eafe237ec19cd2017bd6

  • SHA256

    7999cdd5be8db434dc97cf95afc1baf8ebf03c00779a0d10a9913e010d7975b1

  • SHA512

    15179fd81eca39542facf9207e6abd5e2a151232ae87f81f01c257d52882ffb95708872f0f1c4cad8af605c31431d4d063c778a390c984a0ea11e2f37d2db550

  • SSDEEP

    3072:CH9cKCo1Jk21uoep4bmA67BNfv8V3/QH8AVADNtHArVbYp/eQI7Mk:CLL6lp4bmzRuPQRAHUFYFeQI7Mk

Malware Config

Extracted

Family

azorult

C2

http://gersopakoftaronka.xyz/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe"
    1⤵
      PID:2252

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2252-2-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2252-1-0x0000000001340000-0x0000000001440000-memory.dmp
      Filesize

      1024KB

    • memory/2252-4-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2252-3-0x0000000000400000-0x00000000012CA000-memory.dmp
      Filesize

      14.8MB