Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 01:56

General

  • Target

    c7ab84a215a60e703e2906f68a1bae13_JaffaCakes118.exe

  • Size

    544KB

  • MD5

    c7ab84a215a60e703e2906f68a1bae13

  • SHA1

    e1e57a74e28d8016f074da9cda4b68ab04b1737f

  • SHA256

    dda5d47308c0ebcb2555cda19b4c05a88d633396909456b9ee5fcee42e197724

  • SHA512

    106b653700a6f6cb9b77738648c71efc1096cf6dea253e49763b5e1e33eb2a29db5a60ae5bfecb9ba5e67dd392b3c6289ec4574219caf89e4a96bc186f097d5e

  • SSDEEP

    12288:8MkzW+vUdJ8GHOdE+aTi4CgaOJju1+MtPQRtIdSB:8LeXRuEjTiwJjuEPdB

Malware Config

Extracted

Family

oski

C2

chrisproperties.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7ab84a215a60e703e2906f68a1bae13_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c7ab84a215a60e703e2906f68a1bae13_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\c7ab84a215a60e703e2906f68a1bae13_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c7ab84a215a60e703e2906f68a1bae13_JaffaCakes118.exe"
      2⤵
        PID:2820
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 1240
          3⤵
          • Program crash
          PID:4372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2820 -ip 2820
      1⤵
        PID:4608

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/216-8-0x0000000005980000-0x0000000005990000-memory.dmp

              Filesize

              64KB

            • memory/216-9-0x0000000006F90000-0x000000000702C000-memory.dmp

              Filesize

              624KB

            • memory/216-2-0x0000000005CB0000-0x0000000006254000-memory.dmp

              Filesize

              5.6MB

            • memory/216-3-0x0000000005700000-0x0000000005792000-memory.dmp

              Filesize

              584KB

            • memory/216-4-0x0000000005980000-0x0000000005990000-memory.dmp

              Filesize

              64KB

            • memory/216-5-0x0000000005810000-0x000000000581A000-memory.dmp

              Filesize

              40KB

            • memory/216-6-0x0000000005930000-0x000000000593A000-memory.dmp

              Filesize

              40KB

            • memory/216-7-0x0000000075280000-0x0000000075A30000-memory.dmp

              Filesize

              7.7MB

            • memory/216-1-0x0000000075280000-0x0000000075A30000-memory.dmp

              Filesize

              7.7MB

            • memory/216-10-0x0000000007120000-0x000000000719E000-memory.dmp

              Filesize

              504KB

            • memory/216-0-0x0000000000D80000-0x0000000000E0E000-memory.dmp

              Filesize

              568KB

            • memory/216-16-0x0000000075280000-0x0000000075A30000-memory.dmp

              Filesize

              7.7MB

            • memory/2820-13-0x0000000000400000-0x0000000000438000-memory.dmp

              Filesize

              224KB

            • memory/2820-14-0x0000000000400000-0x0000000000438000-memory.dmp

              Filesize

              224KB

            • memory/2820-15-0x0000000000400000-0x0000000000438000-memory.dmp

              Filesize

              224KB

            • memory/2820-11-0x0000000000400000-0x0000000000438000-memory.dmp

              Filesize

              224KB

            • memory/2820-19-0x0000000000400000-0x0000000000438000-memory.dmp

              Filesize

              224KB