Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
54fe131097ad1ef21cdee8ab8fd48261_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
54fe131097ad1ef21cdee8ab8fd48261_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
54fe131097ad1ef21cdee8ab8fd48261_JaffaCakes118.exe
-
Size
234KB
-
MD5
54fe131097ad1ef21cdee8ab8fd48261
-
SHA1
a3ef1d39bdf7f67409cca110afe7188ae48dbbf9
-
SHA256
cafd16bcd0c9073a4afa2c57b45c7bd40721a3fd358b49337ffbeb4cfb849d7e
-
SHA512
af3cf4f184a5848040e91f5542ecb762f096bf3a63d75d82f49b655b2b490affbed67d56893ccbc9e90ac39a6abdb36d3165bfb43c209445b00102fce7a5c65d
-
SSDEEP
3072:grHEy86mI/FpVBy2g1+21ZDGxGZYHgGiFo6hlQOivDsX:grHEp6mI/FRkDGUZYHgfFokQVvD
Malware Config
Extracted
azorult
http://51.15.62.59/AED77D05-A028-477C-B013-04F33F1385C3/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2152 3088 WerFault.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\54fe131097ad1ef21cdee8ab8fd48261_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54fe131097ad1ef21cdee8ab8fd48261_JaffaCakes118.exe"1⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 12642⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3088 -ip 30881⤵PID:4016