Analysis
-
max time kernel
132s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
75527d372ed138154f3bb0436eba86c5_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
75527d372ed138154f3bb0436eba86c5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
75527d372ed138154f3bb0436eba86c5_JaffaCakes118.exe
-
Size
312KB
-
MD5
75527d372ed138154f3bb0436eba86c5
-
SHA1
69d88323eab142eaaa20bf16d4e91762dc8b01c7
-
SHA256
ed7b1773ca76c4689122f477edabfd309814a28172928205ba22ae9d4b72698c
-
SHA512
d577e8e967a2b2fea0b90becaaa2309fb2affa1a7dda3595cca2bb6bb36fe610fc20007768ea4c6c931be4553c8f4ebb06ad8a377dc43f5cb0c9714d9a4bdfd4
-
SSDEEP
6144:gBzgocPU+GJzweVQIlAloKPyhKcXpVS/:g0s+GJselAloKKnVq
Malware Config
Extracted
azorult
http://51.15.62.59/AED77D05-A028-477C-B013-04F33F1385C3/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2260 632 WerFault.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\75527d372ed138154f3bb0436eba86c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75527d372ed138154f3bb0436eba86c5_JaffaCakes118.exe"1⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 9962⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 632 -ip 6321⤵PID:3564