Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 18:50

General

  • Target

    5645a5321164781b0650e774d59b9e29_JaffaCakes118.exe

  • Size

    858KB

  • MD5

    5645a5321164781b0650e774d59b9e29

  • SHA1

    10975227ea187031eb8249cfe720192483252f5f

  • SHA256

    7c059cc6f0344e6f066dac8db17c6d1e2202448c865cc98d9046e50314e5d0b9

  • SHA512

    80d490e8c4c263803121836a9b220a9d3bed5d4ee9c50a2002283a2d13afdb2f4ae1bb19cef97d74354c1c72f882f014b4101e6a20807f034b7f0fba17a58321

  • SSDEEP

    12288:T0OZhtesZ5Z3c7DEgfD9wer+GLFlIK/BwlTpH900Frt6k+eE5crJ+:T/ttZ3c7DEgfDGer+GLwlTpuEscd+

Malware Config

Extracted

Family

azorult

C2

http://195.206.106.166/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5645a5321164781b0650e774d59b9e29_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5645a5321164781b0650e774d59b9e29_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2312-0-0x0000000002640000-0x000000000267A000-memory.dmp

    Filesize

    232KB

  • memory/2312-1-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2312-2-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2312-3-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2312-4-0x0000000002640000-0x000000000267A000-memory.dmp

    Filesize

    232KB

  • memory/2312-5-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/2312-6-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2312-7-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/2312-11-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/2312-13-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/2312-14-0x0000000002640000-0x000000000267A000-memory.dmp

    Filesize

    232KB