Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
92077215e723b003502dff2ac974dc43_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
92077215e723b003502dff2ac974dc43_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
92077215e723b003502dff2ac974dc43_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
92077215e723b003502dff2ac974dc43
-
SHA1
775b63a3c020c9aead9addb32776beb26704884a
-
SHA256
d5d023c6add2232b9ca0bce13e7b813e9240803feb084d2a8f1d504d96b85a6e
-
SHA512
14880d120b50b9ebfd1f08716802d37ba3021655094799cfa98d763f1b91928a137b46eca6b5df5497f4088b19bde546592429037c533756a708220c47aed764
-
SSDEEP
98304:yJCbuSMburCaMZh0yEKj+WRvrY1dcZ048HV/bFy8jJ7D:MmMbuQZlFY7KsZPN
Malware Config
Extracted
asyncrat
1.0.6
Default
91.193.75.169:4782
DcRatMutex_qwqdanchuk
-
delay
1
-
install
true
-
install_file
Windows Security.exe
-
install_folder
%AppData%
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 5 IoCs
Processes:
Windows Defender Security.exeOski Cracked.exeWindows Defender Security.exeWindows Security.exeWindows Security.exepid Process 2848 Windows Defender Security.exe 1368 Oski Cracked.exe 2684 Windows Defender Security.exe 2604 Windows Security.exe 1956 Windows Security.exe -
Loads dropped DLL 3 IoCs
Processes:
92077215e723b003502dff2ac974dc43_JaffaCakes118.execmd.exepid Process 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 2408 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Defender Security.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\rFMBoLtBRG = "C:\\Users\\Admin\\AppData\\Roaming\\sKGWfQbTCS\\rCTXFgWqTH.exe" Windows Defender Security.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Windows Defender Security.exeWindows Security.exedescription pid Process procid_target PID 2848 set thread context of 2684 2848 Windows Defender Security.exe 30 PID 2604 set thread context of 1956 2604 Windows Security.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2524 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Windows Defender Security.exeWindows Security.exepid Process 2684 Windows Defender Security.exe 2684 Windows Defender Security.exe 2684 Windows Defender Security.exe 2684 Windows Defender Security.exe 2684 Windows Defender Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe 1956 Windows Security.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Windows Defender Security.exeWindows Security.exedescription pid Process Token: SeDebugPrivilege 2684 Windows Defender Security.exe Token: SeDebugPrivilege 1956 Windows Security.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
92077215e723b003502dff2ac974dc43_JaffaCakes118.exeWindows Defender Security.exeWindows Defender Security.execmd.execmd.exeWindows Security.exedescription pid Process procid_target PID 1128 wrote to memory of 2848 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 28 PID 1128 wrote to memory of 2848 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 28 PID 1128 wrote to memory of 2848 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 28 PID 1128 wrote to memory of 2848 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 28 PID 1128 wrote to memory of 1368 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 29 PID 1128 wrote to memory of 1368 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 29 PID 1128 wrote to memory of 1368 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 29 PID 1128 wrote to memory of 1368 1128 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 29 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2848 wrote to memory of 2684 2848 Windows Defender Security.exe 30 PID 2684 wrote to memory of 2860 2684 Windows Defender Security.exe 31 PID 2684 wrote to memory of 2860 2684 Windows Defender Security.exe 31 PID 2684 wrote to memory of 2860 2684 Windows Defender Security.exe 31 PID 2684 wrote to memory of 2860 2684 Windows Defender Security.exe 31 PID 2684 wrote to memory of 2408 2684 Windows Defender Security.exe 33 PID 2684 wrote to memory of 2408 2684 Windows Defender Security.exe 33 PID 2684 wrote to memory of 2408 2684 Windows Defender Security.exe 33 PID 2684 wrote to memory of 2408 2684 Windows Defender Security.exe 33 PID 2860 wrote to memory of 2492 2860 cmd.exe 35 PID 2860 wrote to memory of 2492 2860 cmd.exe 35 PID 2860 wrote to memory of 2492 2860 cmd.exe 35 PID 2860 wrote to memory of 2492 2860 cmd.exe 35 PID 2408 wrote to memory of 2524 2408 cmd.exe 36 PID 2408 wrote to memory of 2524 2408 cmd.exe 36 PID 2408 wrote to memory of 2524 2408 cmd.exe 36 PID 2408 wrote to memory of 2524 2408 cmd.exe 36 PID 2408 wrote to memory of 2604 2408 cmd.exe 37 PID 2408 wrote to memory of 2604 2408 cmd.exe 37 PID 2408 wrote to memory of 2604 2408 cmd.exe 37 PID 2408 wrote to memory of 2604 2408 cmd.exe 37 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38 PID 2604 wrote to memory of 1956 2604 Windows Security.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\92077215e723b003502dff2ac974dc43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\92077215e723b003502dff2ac974dc43_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security.exe"'5⤵
- Creates scheduled task(s)
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5BF5.tmp.bat""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2524
-
-
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Oski Cracked.exe"C:\Users\Admin\AppData\Roaming\Oski Cracked.exe"2⤵
- Executes dropped EXE
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD540c79db60e98e508a95680cfb9ef4722
SHA161959861a5f6a58d0a1c9feb2450b425af3da907
SHA256cae6cafc5da54c829ebf64382e2a7f1dc3a8d62e23945ab5a8ab2f95ca53b200
SHA5123c6405856ed72d6ab33db758e932ea96e472df030fae6ab7dd204f205a1ba4c863d81f3c1384039269093e432aa3c4fcbf272a02bc72fde09effc0ac958714e5
-
Filesize
3.9MB
MD52bd0e61c45d352697c5e16437d8055b0
SHA10b9b24d396a50c2dc13d73e1f2d57c1891de3f31
SHA25671efc8fc1dede4f96e837043ad3cbd38a65bd530ce71ae4d44ddc29843fab70b
SHA51280044d4ece73637328e9b456c3127be02ecc9cea4b12fee65a884fed0266187aec58e6906c652face3b6125d59b9fa10303f02e1d8bfa33dbccb62fd2bc2b73d
-
Filesize
148KB
MD51802b2a6ead8dbd53c25809cb6dcfb93
SHA182293a68beb4729d77badbd252c9f71484915b1e
SHA2560cec4537c128355f982dd06016a733ab2bd486f479f75b1ca01814b57c0ccc7d
SHA5121e92486fe7a3bebe764e1fc499504d28fc11acbb32c614c639cf1e40a30a29b4e9ad258617f5fb4b484de46ef526c32ecb0e6cc96591df40d4db41b6980b4dc2