Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
3b96b4a5a39a69c4db3a0df7629d3e86_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b96b4a5a39a69c4db3a0df7629d3e86_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
3b96b4a5a39a69c4db3a0df7629d3e86_JaffaCakes118.exe
-
Size
221KB
-
MD5
3b96b4a5a39a69c4db3a0df7629d3e86
-
SHA1
0804a8e417c6de3c20d7745432fc84102423227f
-
SHA256
cfb9d01f2bdec78aca212cea7d45c3c6ef3d060f9b23ed71534e2728f9c9500f
-
SHA512
b88e239fd1c1f88445537bce3245a567a24950aebcd494fd23f23118e1e4e7597af7d8fef005f4983381f17ea6fbae62ec6142ee245da532571ea9c2630a4f68
-
SSDEEP
3072:Kelx4Sk5vnlqWlqVLFtMK4kXu3UGUcdV7UgiMEvnnXv53JLcA583HfBNnhk5AN3:rlW5rle4kXQfiJfvjLci83HZ/9N
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1360 4296 WerFault.exe 3b96b4a5a39a69c4db3a0df7629d3e86_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b96b4a5a39a69c4db3a0df7629d3e86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b96b4a5a39a69c4db3a0df7629d3e86_JaffaCakes118.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 13882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4296 -ip 42961⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4296-1-0x00000000006F0000-0x00000000007F0000-memory.dmpFilesize
1024KB
-
memory/4296-2-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4296-3-0x0000000000400000-0x00000000004BE000-memory.dmpFilesize
760KB
-
memory/4296-4-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB