Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 14:12

General

  • Target

    9e76ee5f1468a3ef0b6350f1a9ef99d9_JaffaCakes118.exe

  • Size

    391KB

  • MD5

    9e76ee5f1468a3ef0b6350f1a9ef99d9

  • SHA1

    371f1e0bf5dbd6a239b09dec59f5aa4e526bd072

  • SHA256

    5e671e74e1fa81ca986c3b45ff13deaef27bd2ed866f5ad60e99ac4e0e212fed

  • SHA512

    78f3e679346debabb7ebfeacaef88892ff1c865ac7e04a281ecd2305f790268ef539c622f272452259221ccc964f4d0d64dc97d0b922038855e28ddecf0e288c

  • SSDEEP

    6144:meTJWTZ2r6xuH9Kkpl0APIs49tNUCS0ynyG2hBWG54U1TXtxQJN:meF4YH9K20rsEK//yHWjUBQJN

Malware Config

Extracted

Family

azorult

C2

https://zamorai.com/under.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e76ee5f1468a3ef0b6350f1a9ef99d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9e76ee5f1468a3ef0b6350f1a9ef99d9_JaffaCakes118.exe"
    1⤵
      PID:1680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1680-1-0x00000000005E0000-0x00000000006E0000-memory.dmp

      Filesize

      1024KB

    • memory/1680-2-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1680-3-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1680-4-0x00000000005E0000-0x00000000006E0000-memory.dmp

      Filesize

      1024KB

    • memory/1680-5-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1680-6-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1680-7-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1680-8-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB