Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe
-
Size
273KB
-
MD5
11a185f3d35d037f30042970bb2a2926
-
SHA1
b0849a84c5b0f73d8504eafe237ec19cd2017bd6
-
SHA256
7999cdd5be8db434dc97cf95afc1baf8ebf03c00779a0d10a9913e010d7975b1
-
SHA512
15179fd81eca39542facf9207e6abd5e2a151232ae87f81f01c257d52882ffb95708872f0f1c4cad8af605c31431d4d063c778a390c984a0ea11e2f37d2db550
-
SSDEEP
3072:CH9cKCo1Jk21uoep4bmA67BNfv8V3/QH8AVADNtHArVbYp/eQI7Mk:CLL6lp4bmzRuPQRAHUFYFeQI7Mk
Malware Config
Extracted
azorult
http://gersopakoftaronka.xyz/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2116 2736 WerFault.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\11a185f3d35d037f30042970bb2a2926_JaffaCakes118.exe"1⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 7322⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2736 -ip 27361⤵PID:4976