Analysis

  • max time kernel
    139s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 22:57

General

  • Target

    65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    65155eda022fd171ab983097f2bbe924

  • SHA1

    687d17dccfa13cb5534c1f6729e28cde6e03bcb8

  • SHA256

    5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570

  • SHA512

    dd6b0bc869d09287ca662e30569c70f09ddd21e26f239fe06c6ee6e8ccdf0c9842c6206476bf4c1d1b1a0a1f11d11fda90c585a9ab6fa9db12e04135a13939ea

  • SSDEEP

    12288:S3HxvTzdIhHc6s6fvAHL8EIEgCPcuxWlsmP8H7zNA8vF0FBHoGKTilq6S63mMz:S3x3S7s6fvAHa1eWnEb6+O7KGlpqMz

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\65155eda022fd171ab983097f2bbe924_JaffaCakes118.exe"
      2⤵
        PID:4256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3752-0-0x00000000007D0000-0x00000000007D1000-memory.dmp

      Filesize

      4KB

    • memory/3752-1-0x0000000000400000-0x0000000000517000-memory.dmp

      Filesize

      1.1MB

    • memory/3752-3-0x00000000007D0000-0x00000000007D1000-memory.dmp

      Filesize

      4KB

    • memory/3752-9-0x0000000000400000-0x0000000000517000-memory.dmp

      Filesize

      1.1MB

    • memory/4256-5-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4256-8-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4256-10-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4256-12-0x0000000000470000-0x0000000000539000-memory.dmp

      Filesize

      804KB

    • memory/4256-13-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB