Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
6e48cace821190acc61587d4ae6ebb93_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6e48cace821190acc61587d4ae6ebb93_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6e48cace821190acc61587d4ae6ebb93_JaffaCakes118.exe
-
Size
244KB
-
MD5
6e48cace821190acc61587d4ae6ebb93
-
SHA1
eb2e58ab624c9e9404a1cab1983f1f60ec62ac35
-
SHA256
b92c00f58393af56a7e29cff9d847354f8c36eb5ebab917b767b92de09b09023
-
SHA512
b2cd0b9e50d139e28b06777961215f28d5dd0d400e721b01c13b440c23490f431a102c5b9604865fdabb7d97bcdcb4d1e9fb51a5add3a3f614cb2aee9a7ae137
-
SSDEEP
6144:laO6uhkLamLC//AULObTLPUdQPrd57DlWXpQ:laOBkWf//KnPMkG
Malware Config
Extracted
azorult
http://84.38.132.137/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1260 828 WerFault.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e48cace821190acc61587d4ae6ebb93_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e48cace821190acc61587d4ae6ebb93_JaffaCakes118.exe"1⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 14322⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 828 -ip 8281⤵PID:3416