Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
536282f4647c267c7701c3ae9f3cd411
-
SHA1
8f89dee4f5d9d02c65e35117497a5609343f7c08
-
SHA256
fe47d06fefd2002c1d73c82f09121869581adef61160b4f16721cd3d89510fa7
-
SHA512
16d8f6ff826acfab91dfab94dec4c4627d7e33408006cd861de8f9e30d43e47101af5075f2f22c387af911ea197edfd5935dea96bd50ed719c62187e080cae86
-
SSDEEP
24576:AAHnh+eWsN3skA4RV1Hom2KXMmHahIBAwqVFynRcof2S5:3h+ZkldoPK8YaheAw+gRlr
Malware Config
Extracted
azorult
http://mixerfoxy.xyz/fox/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4452 set thread context of 4800 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 91 -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4800 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 91 PID 4452 wrote to memory of 4800 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 91 PID 4452 wrote to memory of 4800 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 91 PID 4452 wrote to memory of 4800 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 91 PID 4452 wrote to memory of 4800 4452 536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\536282f4647c267c7701c3ae9f3cd411_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4424 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:4752