Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe
-
Size
595KB
-
MD5
321c6230b9d1a1082461464b9faf1570
-
SHA1
c302f07f6c01ab0c6b831865d092afb902ee1e83
-
SHA256
4d17534f1f36caa88187ffb6d18fada59e60130a03106630c1cf51fd3c302148
-
SHA512
90897955fc124b9d725b56780ed14d20233283a75ad190558fde41f8c8d7388a7b62ffa24d0018b372ecbf0956df235006d07af9bf83dbb2c8e4e91162485986
-
SSDEEP
12288:YW9xNbjckK1U5K62bjgJJZ+at9upCAt7VoiRw:tbjrKef2/g4aD87yii
Malware Config
Extracted
azorult
http://doueven.click/gate.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2716 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2824 2864 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe 28 PID 2864 wrote to memory of 2824 2864 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe 28 PID 2864 wrote to memory of 2824 2864 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe 28 PID 2864 wrote to memory of 2824 2864 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe 28 PID 2824 wrote to memory of 2716 2824 cmd.exe 30 PID 2824 wrote to memory of 2716 2824 cmd.exe 30 PID 2824 wrote to memory of 2716 2824 cmd.exe 30 PID 2824 wrote to memory of 2716 2824 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 1 & del "C:\Users\Admin\AppData\Local\Temp\321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2716
-
-