Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
92077215e723b003502dff2ac974dc43_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
92077215e723b003502dff2ac974dc43_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
92077215e723b003502dff2ac974dc43_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
92077215e723b003502dff2ac974dc43
-
SHA1
775b63a3c020c9aead9addb32776beb26704884a
-
SHA256
d5d023c6add2232b9ca0bce13e7b813e9240803feb084d2a8f1d504d96b85a6e
-
SHA512
14880d120b50b9ebfd1f08716802d37ba3021655094799cfa98d763f1b91928a137b46eca6b5df5497f4088b19bde546592429037c533756a708220c47aed764
-
SSDEEP
98304:yJCbuSMburCaMZh0yEKj+WRvrY1dcZ048HV/bFy8jJ7D:MmMbuQZlFY7KsZPN
Malware Config
Extracted
asyncrat
1.0.6
Default
91.193.75.169:4782
DcRatMutex_qwqdanchuk
-
delay
1
-
install
true
-
install_file
Windows Security.exe
-
install_folder
%AppData%
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
92077215e723b003502dff2ac974dc43_JaffaCakes118.exeWindows Defender Security.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Windows Defender Security.exe -
Executes dropped EXE 6 IoCs
Processes:
Windows Defender Security.exeOski Cracked.exeWindows Defender Security.exeWindows Security.exeWindows Security.exeWindows Security.exepid Process 3376 Windows Defender Security.exe 5040 Oski Cracked.exe 3528 Windows Defender Security.exe 100 Windows Security.exe 4180 Windows Security.exe 4848 Windows Security.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Defender Security.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rFMBoLtBRG = "C:\\Users\\Admin\\AppData\\Roaming\\sKGWfQbTCS\\rCTXFgWqTH.exe" Windows Defender Security.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Windows Defender Security.exeWindows Security.exedescription pid Process procid_target PID 3376 set thread context of 3528 3376 Windows Defender Security.exe 89 PID 100 set thread context of 4848 100 Windows Security.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2672 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Windows Defender Security.exeWindows Security.exeWindows Security.exepid Process 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 3528 Windows Defender Security.exe 100 Windows Security.exe 100 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe 4848 Windows Security.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Windows Defender Security.exeWindows Security.exeWindows Security.exedescription pid Process Token: SeDebugPrivilege 3528 Windows Defender Security.exe Token: SeDebugPrivilege 100 Windows Security.exe Token: SeDebugPrivilege 4848 Windows Security.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
92077215e723b003502dff2ac974dc43_JaffaCakes118.exeWindows Defender Security.exeWindows Defender Security.execmd.execmd.exeWindows Security.exedescription pid Process procid_target PID 2544 wrote to memory of 3376 2544 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 87 PID 2544 wrote to memory of 3376 2544 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 87 PID 2544 wrote to memory of 3376 2544 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 87 PID 2544 wrote to memory of 5040 2544 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 88 PID 2544 wrote to memory of 5040 2544 92077215e723b003502dff2ac974dc43_JaffaCakes118.exe 88 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3376 wrote to memory of 3528 3376 Windows Defender Security.exe 89 PID 3528 wrote to memory of 3760 3528 Windows Defender Security.exe 90 PID 3528 wrote to memory of 3760 3528 Windows Defender Security.exe 90 PID 3528 wrote to memory of 3760 3528 Windows Defender Security.exe 90 PID 3528 wrote to memory of 1712 3528 Windows Defender Security.exe 91 PID 3528 wrote to memory of 1712 3528 Windows Defender Security.exe 91 PID 3528 wrote to memory of 1712 3528 Windows Defender Security.exe 91 PID 1712 wrote to memory of 2672 1712 cmd.exe 94 PID 1712 wrote to memory of 2672 1712 cmd.exe 94 PID 1712 wrote to memory of 2672 1712 cmd.exe 94 PID 3760 wrote to memory of 4548 3760 cmd.exe 95 PID 3760 wrote to memory of 4548 3760 cmd.exe 95 PID 3760 wrote to memory of 4548 3760 cmd.exe 95 PID 1712 wrote to memory of 100 1712 cmd.exe 96 PID 1712 wrote to memory of 100 1712 cmd.exe 96 PID 1712 wrote to memory of 100 1712 cmd.exe 96 PID 100 wrote to memory of 4180 100 Windows Security.exe 97 PID 100 wrote to memory of 4180 100 Windows Security.exe 97 PID 100 wrote to memory of 4180 100 Windows Security.exe 97 PID 100 wrote to memory of 4848 100 Windows Security.exe 98 PID 100 wrote to memory of 4848 100 Windows Security.exe 98 PID 100 wrote to memory of 4848 100 Windows Security.exe 98 PID 100 wrote to memory of 4848 100 Windows Security.exe 98 PID 100 wrote to memory of 4848 100 Windows Security.exe 98 PID 100 wrote to memory of 4848 100 Windows Security.exe 98 PID 100 wrote to memory of 4848 100 Windows Security.exe 98 PID 100 wrote to memory of 4848 100 Windows Security.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\92077215e723b003502dff2ac974dc43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\92077215e723b003502dff2ac974dc43_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service\Windows Defender Security.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security.exe"'5⤵
- Creates scheduled task(s)
PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp82AD.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"6⤵
- Executes dropped EXE
PID:4180
-
-
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Oski Cracked.exe"C:\Users\Admin\AppData\Roaming\Oski Cracked.exe"2⤵
- Executes dropped EXE
PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507B
MD58cf94b5356be60247d331660005941ec
SHA1fdedb361f40f22cb6a086c808fc0056d4e421131
SHA25652a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0
SHA512b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651
-
Filesize
160B
MD5aa3cc158e9d4f938d0a74f8cf8631f5b
SHA1ec4450347fdebb4ce928d17c08626751390b48e9
SHA2564e0085d7583f579461d35e9660d4d909d94aaf07518f03ae2677ff1929738282
SHA512af49a6ab73cc0a5797e15798421cce4df6acfb02eb41e708e6b35e92beedf24ffee66d631fe7ba3d884a20656d9ad41ebecc989e636b4d17cd26ef7add736469
-
Filesize
3.9MB
MD52bd0e61c45d352697c5e16437d8055b0
SHA10b9b24d396a50c2dc13d73e1f2d57c1891de3f31
SHA25671efc8fc1dede4f96e837043ad3cbd38a65bd530ce71ae4d44ddc29843fab70b
SHA51280044d4ece73637328e9b456c3127be02ecc9cea4b12fee65a884fed0266187aec58e6906c652face3b6125d59b9fa10303f02e1d8bfa33dbccb62fd2bc2b73d
-
Filesize
148KB
MD51802b2a6ead8dbd53c25809cb6dcfb93
SHA182293a68beb4729d77badbd252c9f71484915b1e
SHA2560cec4537c128355f982dd06016a733ab2bd486f479f75b1ca01814b57c0ccc7d
SHA5121e92486fe7a3bebe764e1fc499504d28fc11acbb32c614c639cf1e40a30a29b4e9ad258617f5fb4b484de46ef526c32ecb0e6cc96591df40d4db41b6980b4dc2