Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe
-
Size
356KB
-
MD5
56f01b749a568fa4b6e180484b11e69b
-
SHA1
04ebfb5a9626903d6e8418db85a5fb621f1c2a9a
-
SHA256
1d87746dfce6e0260c8c08b5d1d85ecbe200be70fa0e2dcb4effd37c47dce94d
-
SHA512
e201e2be1b374bc0464f66185a50bcc0d6ccb2a1979b3bb10e624ec92d45b6e2d053d7f57defd506e77f2417b0f247f9d6be542bfb5ef4e0bbf8c317d86f9460
-
SSDEEP
6144:EyoFxU6Sz/8bhZYBg/97eYFtKIGWbbLPCCaOJkZLv3BnqKjAucdEOjeHQfM2T:ENZSTDg/kYLKIf7P7aOJkpwucdEGeynT
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exedescription pid process target process PID 2084 set thread context of 2572 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exepid process 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exepid process 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exedescription pid process target process PID 2084 wrote to memory of 2572 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe PID 2084 wrote to memory of 2572 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe PID 2084 wrote to memory of 2572 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe PID 2084 wrote to memory of 2572 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe PID 2084 wrote to memory of 2572 2084 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe 56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56f01b749a568fa4b6e180484b11e69b_JaffaCakes118.exe"2⤵PID:2572