Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 13:16

General

  • Target

    8d97f71457a0a2977a82571583306c26_JaffaCakes118.exe

  • Size

    396KB

  • MD5

    8d97f71457a0a2977a82571583306c26

  • SHA1

    936800c740c13a3fc2e05a1c1376007f58002a7d

  • SHA256

    a7c9e0bba10b853dd183f2c6b732bd0e1001f1a7b455007dc3022ff465b7797f

  • SHA512

    5708375538d7b9927784809912a0b0588e200aaf62668226b9b83c2c4879306d989bef3033807bd7bb8989a56b58b2369b42327968f23f2dddc6d9b2975c51f5

  • SSDEEP

    12288:7ycqterR53JplKiFwgxtQ9LdQAGAHUq/uzK6UA8t9HHHHHHHHHIHHHHHHczJXNAG:7QtervJXzQ9L

Malware Config

Extracted

Family

oski

C2

forum.daffodil-bd.com

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d97f71457a0a2977a82571583306c26_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d97f71457a0a2977a82571583306c26_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Users\Admin\AppData\Local\Temp\8d97f71457a0a2977a82571583306c26_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8d97f71457a0a2977a82571583306c26_JaffaCakes118.exe"
      2⤵
        PID:3232
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 964
          3⤵
          • Program crash
          PID:5016
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3232 -ip 3232
      1⤵
        PID:4672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\msvcp140.dll

        Filesize

        9KB

        MD5

        081c82c6dd70c98891b833f1f45bae10

        SHA1

        44e08fbc6374c124c1f71515447dd779a16c91b5

        SHA256

        f1d30c9ec33e8ccba931f4fde5cfcbd051a218e3a06370892ee81cad22cee298

        SHA512

        29124edef11c0bfc03cc9b784c9bff11de713d75499eb8df2487d8e45bbd5251281508bfdfbfac0c628220d2565f3282a45c313683022457beb9a5f4607b9d36

      • memory/3232-12-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/3232-25-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/3232-9-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/3232-10-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/3232-13-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4996-3-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/4996-5-0x00000000050F0000-0x0000000005182000-memory.dmp

        Filesize

        584KB

      • memory/4996-14-0x00000000751C0000-0x0000000075970000-memory.dmp

        Filesize

        7.7MB

      • memory/4996-6-0x0000000005190000-0x000000000522C000-memory.dmp

        Filesize

        624KB

      • memory/4996-4-0x0000000005500000-0x0000000005AA4000-memory.dmp

        Filesize

        5.6MB

      • memory/4996-1-0x00000000751C0000-0x0000000075970000-memory.dmp

        Filesize

        7.7MB

      • memory/4996-8-0x0000000005060000-0x000000000506A000-memory.dmp

        Filesize

        40KB

      • memory/4996-2-0x0000000002720000-0x0000000002726000-memory.dmp

        Filesize

        24KB

      • memory/4996-0-0x0000000000350000-0x00000000003BC000-memory.dmp

        Filesize

        432KB