Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 13:26
Behavioral task
behavioral1
Sample
12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe
-
Size
521KB
-
MD5
12ef629e17e5374cdf8947717ce46634
-
SHA1
6c230f4797366af5ec794cab87e883b6679b55a7
-
SHA256
0fa40fd927ec6928a9f9b246dd2b58266875f33cc7dc6eb7bfdad412f96b1c6a
-
SHA512
18fb2df4b12e4f47a7b4e3ed4c65884c7d58ea0ccc0befcd97f42aa669ebb51592e6654cd6e0318203d4a836f91ab25d6243c645edfe3a95429d1288afb7ad53
-
SSDEEP
3072:SzbewBG1ytoE+9O4Lp8RkPgsdkvU4mXhZSP8Npe6NkkgC1kzpiRpJ:CohE2LuRkxHXvi8negkkEViR
Malware Config
Extracted
azorult
http://fresfolkrules.ga/deepwater/32/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
resource yara_rule behavioral1/memory/1268-0-0x0000000000A20000-0x0000000000B20000-memory.dmp upx behavioral1/memory/1268-73-0x0000000000A20000-0x0000000000B20000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1268 set thread context of 2672 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 29 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2672 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 29 PID 1268 wrote to memory of 2672 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 29 PID 1268 wrote to memory of 2672 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 29 PID 1268 wrote to memory of 2672 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 29 PID 1268 wrote to memory of 2672 1268 12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12ef629e17e5374cdf8947717ce46634_JaffaCakes118.exe"2⤵PID:2672
-