Analysis
-
max time kernel
115s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe
-
Size
514KB
-
MD5
e029f21834d5ceea1006d1658768f4dc
-
SHA1
a4bb6e1e09621536559355cecdb3409f9b7d3ebe
-
SHA256
c17243e46ff224631e589c55642c3666e5c560715841e8b8ebdd511cb70da8dd
-
SHA512
8be438a01be27a7e79bc2323fac9b1f586fea4aa7a3db8cf11114b16737530b051b2fa1ce8ba43e4950286b84f27ce3894dec68d2141cf6ecc42b0562a40dc0c
-
SSDEEP
12288:jIJFd3ilGzEUHt61r+Rnk3GWBdWaj/7+JZvH4r+:edxqKeWGR7+XvN
Malware Config
Extracted
oski
stanelectronics.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1436 set thread context of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 -
Program crash 1 IoCs
pid pid_target Process procid_target 5080 744 WerFault.exe 102 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102 PID 1436 wrote to memory of 744 1436 e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e029f21834d5ceea1006d1658768f4dc_JaffaCakes118.exe"2⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 13163⤵
- Program crash
PID:5080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 744 -ip 7441⤵PID:3360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=760 --field-trial-handle=2276,i,1205556100727695622,5044463180471657307,262144 --variations-seed-version /prefetch:81⤵PID:4732