Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 01:57
Behavioral task
behavioral1
Sample
5fd0b3d95d57cb446c8d9e3518c31c97_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5fd0b3d95d57cb446c8d9e3518c31c97_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5fd0b3d95d57cb446c8d9e3518c31c97_JaffaCakes118.exe
-
Size
112KB
-
MD5
5fd0b3d95d57cb446c8d9e3518c31c97
-
SHA1
b3d5204e03482df3d768aea9ab5548c73281e498
-
SHA256
7e1bfb1f0bb44828bc30d5ab264f0f6dad6592b84b7b6c050ed4ef933a19b2b2
-
SHA512
201eba4a75ec0689997f0fa6eba732936947d9944186e300e38b789c251c4ae9043ee874deeb1b3577f8c96da86eb9b14bb87e00ad9132595013df375d02ab5d
-
SSDEEP
3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEYnE/dxg/:Zzx7ZApszolIo7lf/ipT/d
Malware Config
Extracted
azorult
http://olegaekprk.temp.swtest.ru/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fd0b3d95d57cb446c8d9e3518c31c97_JaffaCakes118.exe