Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 22:57

General

  • Target

    65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    65155eda022fd171ab983097f2bbe924

  • SHA1

    687d17dccfa13cb5534c1f6729e28cde6e03bcb8

  • SHA256

    5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570

  • SHA512

    dd6b0bc869d09287ca662e30569c70f09ddd21e26f239fe06c6ee6e8ccdf0c9842c6206476bf4c1d1b1a0a1f11d11fda90c585a9ab6fa9db12e04135a13939ea

  • SSDEEP

    12288:S3HxvTzdIhHc6s6fvAHL8EIEgCPcuxWlsmP8H7zNA8vF0FBHoGKTilq6S63mMz:S3x3S7s6fvAHa1eWnEb6+O7KGlpqMz

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe"
      2⤵
        PID:2596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/756-0-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/756-1-0x0000000000400000-0x0000000000517000-memory.dmp

      Filesize

      1.1MB

    • memory/756-3-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/756-18-0x0000000000400000-0x0000000000517000-memory.dmp

      Filesize

      1.1MB

    • memory/2596-15-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-20-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-19-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-13-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-11-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-5-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-9-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-7-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2596-21-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB