Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 12:48
Static task
static1
Behavioral task
behavioral1
Sample
a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exe
-
Size
971KB
-
MD5
a0b93b3b11c03ea3cb240f28628ff799
-
SHA1
ae80eb366a814fd4a8249f53c45e78cf1271ddd3
-
SHA256
88bef725fcfe0ce5e56d96ce3f4d47d478e11839a12d8d7e2335ca3fc5e42ec1
-
SHA512
f70093efc9b7ed53712f96cf9bdadb155f7a382b47e7961dd9722dea084ccfe5b4e3d298618314aa74aa3534ae28a61cdad4a54f572f84371c568f45b6f13449
-
SSDEEP
24576:7dQcgqeDLQd8croAGSBlQDRVA4lyh5Lff73YOmwgPK:ZaqQLy8SoAGmiDDhgvYhwgPK
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exepid process 2848 a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exe 2848 a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exe 2848 a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exepid process 2848 a0b93b3b11c03ea3cb240f28628ff799_JaffaCakes118.exe