Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
ea51aade58d241c3504d4ea8190ead9b
-
SHA1
945684f37c73da7c66bf296b2f846cc9eee2ace3
-
SHA256
b439769c10bdaade1b16c9472eabeaaed21fede1bce1fb164091bb9ad926d15a
-
SHA512
0288571529a12735af51d9c40d857962ba49ed63ba458e0a4bee4e9f1c7ba806d00d8f58dfa835aa82d2f888e0e5647fc12d36511a9b4b1fbec59f0a9fa7876f
-
SSDEEP
24576:Yu6J33O0c+JY5UZ+XC0kGso6Faag6vQ9U9tWpz2z80DHB1bW2kWY:Su0c++OCvkGs9FaUwk1a4Y
Malware Config
Extracted
azorult
http://mytrafvip.host/errors/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exedescription pid process target process PID 4936 set thread context of 3280 4936 ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exeea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exedescription pid process target process PID 4936 wrote to memory of 3280 4936 ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe PID 4936 wrote to memory of 3280 4936 ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe PID 4936 wrote to memory of 3280 4936 ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe PID 4936 wrote to memory of 3280 4936 ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe PID 4936 wrote to memory of 3280 4936 ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea51aade58d241c3504d4ea8190ead9b_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3280
-