Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
a0b5ef9c7bca36dff229b0cadea669ab_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a0b5ef9c7bca36dff229b0cadea669ab_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a0b5ef9c7bca36dff229b0cadea669ab_JaffaCakes118.exe
-
Size
220KB
-
MD5
a0b5ef9c7bca36dff229b0cadea669ab
-
SHA1
5d8925b7ebbadc3a71180aa100f2985aaf96d34b
-
SHA256
356835735208c4c73e5be68466ddc7a0c86381600c1d6308db7417a7006c1ce7
-
SHA512
f19f4947101eedf59d06c05c88dac68baf06c6a9b299c9cd116732785e5f612d86e7b7ed06ffd4f0145bd26507b845542f37918b66ac8d0e6de8ea7be650a1ff
-
SSDEEP
6144:Z9IYHESR/B3w8mVwS1yZXIf/+sb3alWnt:d/B3w8IwZG/+int
Malware Config
Extracted
azorult
http://getsees.space/kweku/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2904 1696 WerFault.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b5ef9c7bca36dff229b0cadea669ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0b5ef9c7bca36dff229b0cadea669ab_JaffaCakes118.exe"1⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 12762⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1696 -ip 16961⤵PID:1580