Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
2a4fd922140aca6f35fbf95a0976b7f5_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a4fd922140aca6f35fbf95a0976b7f5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2a4fd922140aca6f35fbf95a0976b7f5_JaffaCakes118.exe
-
Size
265KB
-
MD5
2a4fd922140aca6f35fbf95a0976b7f5
-
SHA1
9d80c7799604c393b13cae44d52bf3c00a48982d
-
SHA256
08e3506338582147f8c430e5654cf9edac93ec8b0058624445279a8caedd0a11
-
SHA512
ee6860cee1b41321585be5b490f9bff496be5e17441042ddcdf253b6a25af799b55043e255e5a5354fd08c22832efd3764227a3fd6eb9ac0e1e53ed7c899ac79
-
SSDEEP
3072:6MHZ1WW5LewwCPoYwYefysW3LQxP6nb2m059CSF:FHvoCPopYefyh3L8ms
Malware Config
Extracted
azorult
http://allods-down.site/yumi/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4892 3848 WerFault.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a4fd922140aca6f35fbf95a0976b7f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a4fd922140aca6f35fbf95a0976b7f5_JaffaCakes118.exe"1⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 13842⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3848 -ip 38481⤵PID:4828