Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
536282f4647c267c7701c3ae9f3cd411
-
SHA1
8f89dee4f5d9d02c65e35117497a5609343f7c08
-
SHA256
fe47d06fefd2002c1d73c82f09121869581adef61160b4f16721cd3d89510fa7
-
SHA512
16d8f6ff826acfab91dfab94dec4c4627d7e33408006cd861de8f9e30d43e47101af5075f2f22c387af911ea197edfd5935dea96bd50ed719c62187e080cae86
-
SSDEEP
24576:AAHnh+eWsN3skA4RV1Hom2KXMmHahIBAwqVFynRcof2S5:3h+ZkldoPK8YaheAw+gRlr
Malware Config
Extracted
azorult
http://mixerfoxy.xyz/fox/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 2952 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 29 -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2952 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 29 PID 2900 wrote to memory of 2952 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 29 PID 2900 wrote to memory of 2952 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 29 PID 2900 wrote to memory of 2952 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 29 PID 2900 wrote to memory of 2952 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 29 PID 2900 wrote to memory of 2952 2900 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:2952
-