Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 07:08

General

  • Target

    7135ffc132104c1e9e641628c83ffeb9_JaffaCakes118.exe

  • Size

    210KB

  • MD5

    7135ffc132104c1e9e641628c83ffeb9

  • SHA1

    8a2cb8da0d56d3d0499505d1f839cfcf02610fa0

  • SHA256

    9eb9e56334ebaa7d666ce954e87d62327be12475faebe5f2d19780baad6a768c

  • SHA512

    ebcfc75902fc448b766c550b43c7610758dffda551d7674d348b796bf50288911fb07161e6536c788b50127a4a76e5e2f85bcac456d8352cf2f6f9f30e967f86

  • SSDEEP

    3072:/Al2HtifWeCKXEA1KMNkrFlqJkCxeYbgsYrpM24vCnm9uxnd+2XPBNKHAvZ:/22NKC5A1xyr3AkYF8hpYvEm9IJAA

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7135ffc132104c1e9e641628c83ffeb9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7135ffc132104c1e9e641628c83ffeb9_JaffaCakes118.exe"
    1⤵
      PID:3048

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3048-0-0x00000000001B0000-0x00000000001C1000-memory.dmp

      Filesize

      68KB

    • memory/3048-1-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3048-2-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3048-4-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3048-3-0x00000000001B0000-0x00000000001C1000-memory.dmp

      Filesize

      68KB