Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
88822c8f1f66012102dee1e3bf857e7a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
88822c8f1f66012102dee1e3bf857e7a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
88822c8f1f66012102dee1e3bf857e7a_JaffaCakes118.exe
-
Size
313KB
-
MD5
88822c8f1f66012102dee1e3bf857e7a
-
SHA1
a08810ce476ea5fa9a956724290bc0febab838c9
-
SHA256
11ea29b9d6118362827665080ae28ef95f24b407c0b47ab12fb10e5fbe87790c
-
SHA512
88d727c260a40ec56e392c416e1b7171cc4150169bc843948081811d6682137008579ee75b53cc69e973479c66210c72565b3562449868419bbbdc2f6a6b1069
-
SSDEEP
3072:Te3kUHvVnJiRymCNW46B5oY4RBxh2ucmPCFeqGMZSuAoQJjzAtJYG6DiIncgNexy:CkUHdsymgp5kurqGZuIzaOGwiJgq
Malware Config
Extracted
azorult
http://92.63.197.104/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3980 3208 WerFault.exe 88822c8f1f66012102dee1e3bf857e7a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88822c8f1f66012102dee1e3bf857e7a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88822c8f1f66012102dee1e3bf857e7a_JaffaCakes118.exe"1⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 14282⤵
- Program crash
PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3208 -ip 32081⤵PID:2108