Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
10a34640fba05520712254b9b9405be0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
10a34640fba05520712254b9b9405be0_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
10a34640fba05520712254b9b9405be0_JaffaCakes118.exe
-
Size
367KB
-
MD5
10a34640fba05520712254b9b9405be0
-
SHA1
4312126f7c95d384c0dd82e23565090563274a39
-
SHA256
9c99458e7cca21da41178cdff64715ced87e03fe61e33182854e4b0438b3b1f9
-
SHA512
cea4500db17d80b5acee020197246b8188dbee320116e95639617fe4fce8290abef281d492f4f097aa7a014263ffbe521505cba1618ddf031c310bca42e117c9
-
SSDEEP
6144:hw5nKlNFAmzKpQl/nTWrCPPsD8xJpzPNXtSlpL+pyxmjO+moBAZXUBgGnLU:OuDAmRLWrxD8xDzPNdSlpL+ywjrmQAZR
Malware Config
Extracted
azorult
https://corpcougar.com/bguy/32/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
10a34640fba05520712254b9b9405be0_JaffaCakes118.exedescription pid process target process PID 1224 set thread context of 2928 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
10a34640fba05520712254b9b9405be0_JaffaCakes118.exepid process 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
10a34640fba05520712254b9b9405be0_JaffaCakes118.exepid process 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
10a34640fba05520712254b9b9405be0_JaffaCakes118.exedescription pid process target process PID 1224 wrote to memory of 2928 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe PID 1224 wrote to memory of 2928 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe PID 1224 wrote to memory of 2928 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe PID 1224 wrote to memory of 2928 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe PID 1224 wrote to memory of 2928 1224 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe 10a34640fba05520712254b9b9405be0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a34640fba05520712254b9b9405be0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10a34640fba05520712254b9b9405be0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\10a34640fba05520712254b9b9405be0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10a34640fba05520712254b9b9405be0_JaffaCakes118.exe"2⤵PID:2928