Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
b3a706e520699064bdab959650118d6c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b3a706e520699064bdab959650118d6c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b3a706e520699064bdab959650118d6c_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
b3a706e520699064bdab959650118d6c
-
SHA1
ff1bc950f4fa5caa2470b5fd88b3acd456cb1ed5
-
SHA256
9ca651af22fa0d77a3a9d070aff8bdb65a39415d9add9f12ad21fec20cccb742
-
SHA512
eedbd32552bbc499cdebeb92ab0e477f2d40178c88f417c4861d46e307c68af52842ddfc5b09e7ba8c022347d1454dccfe46e49c4a4c99ee549a23dd9c59883d
-
SSDEEP
24576:Bu6Jx3O0c+JY5UZ+XC0kGso/WaetRzGFEAn0AJscHYWvDAUWY:TI0c++OCvkGsUWaJ9VDYWbWY
Malware Config
Extracted
azorult
http://185.222.57.75/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1420 set thread context of 3008 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 28 PID 1420 set thread context of 2164 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 32 PID 1420 set thread context of 2952 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 34 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1420 wrote to memory of 3008 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 28 PID 1420 wrote to memory of 3008 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 28 PID 1420 wrote to memory of 3008 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 28 PID 1420 wrote to memory of 3008 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 28 PID 1420 wrote to memory of 3008 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 28 PID 1420 wrote to memory of 3008 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 28 PID 1420 wrote to memory of 2164 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 32 PID 1420 wrote to memory of 2164 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 32 PID 1420 wrote to memory of 2164 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 32 PID 1420 wrote to memory of 2164 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 32 PID 1420 wrote to memory of 2164 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 32 PID 1420 wrote to memory of 2164 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 32 PID 1420 wrote to memory of 2952 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 34 PID 1420 wrote to memory of 2952 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 34 PID 1420 wrote to memory of 2952 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 34 PID 1420 wrote to memory of 2952 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 34 PID 1420 wrote to memory of 2952 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 34 PID 1420 wrote to memory of 2952 1420 b3a706e520699064bdab959650118d6c_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"2⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"2⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3a706e520699064bdab959650118d6c_JaffaCakes118.exe"2⤵PID:2952
-