Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
1d14c938c3dc37a1e53ffa556b22d177
-
SHA1
d212b0d999e33da5994d3966e4bcbb369b1c7289
-
SHA256
fccc12ba866c71644e8d877c8780ee0ba0178c1712b3c05f957f90f59de6d493
-
SHA512
816370cd07c7c04fd6a113c2ebb8fa878d7b4df186101e5bd337bc1f931c292d9d72c7cd6c2895c17be612c79d5ab5a56a848407a8072a25f2817f98c1bac176
-
SSDEEP
12288:K5Ar24e2MaUYo2TVXsdSY7h02P9e1BSPjY7o5B/hlG4sPY0dye3AaQYeFaotTQpv:K5Q7v+7h02Pg+M74HGfIaQ6rei
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
raccoon
d58ee081e4d259676e5c18189c82f5356e64ec30
-
url4cnc
https://telete.in/brikitiki
Extracted
oski
courtneysdv.ac.ug
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral1/memory/2660-41-0x0000000000400000-0x0000000000497000-memory.dmp family_raccoon_v1 behavioral1/memory/2660-39-0x0000000000400000-0x0000000000497000-memory.dmp family_raccoon_v1 behavioral1/memory/2660-43-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral1/memory/2660-58-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 -
Executes dropped EXE 4 IoCs
pid Process 2064 CVhffgrdDFbv.exe 2544 zVhgfgjbnv.exe 2644 CVhffgrdDFbv.exe 2484 zVhgfgjbnv.exe -
Loads dropped DLL 11 IoCs
pid Process 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2064 CVhffgrdDFbv.exe 2544 zVhgfgjbnv.exe 240 WerFault.exe 240 WerFault.exe 240 WerFault.exe 240 WerFault.exe 240 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2644 CVhffgrdDFbv.exe 2644 CVhffgrdDFbv.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2484 zVhgfgjbnv.exe 2484 zVhgfgjbnv.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2064 set thread context of 2644 2064 CVhffgrdDFbv.exe 30 PID 2104 set thread context of 2660 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 31 PID 2544 set thread context of 2484 2544 zVhgfgjbnv.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 240 2484 WerFault.exe 32 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2660 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2064 CVhffgrdDFbv.exe 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2544 zVhgfgjbnv.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 2064 CVhffgrdDFbv.exe 2544 zVhgfgjbnv.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2064 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2544 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 29 PID 2104 wrote to memory of 2544 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 29 PID 2104 wrote to memory of 2544 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 29 PID 2104 wrote to memory of 2544 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 29 PID 2064 wrote to memory of 2644 2064 CVhffgrdDFbv.exe 30 PID 2064 wrote to memory of 2644 2064 CVhffgrdDFbv.exe 30 PID 2064 wrote to memory of 2644 2064 CVhffgrdDFbv.exe 30 PID 2064 wrote to memory of 2644 2064 CVhffgrdDFbv.exe 30 PID 2064 wrote to memory of 2644 2064 CVhffgrdDFbv.exe 30 PID 2104 wrote to memory of 2660 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2660 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2660 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2660 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2660 2104 1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2484 2544 zVhgfgjbnv.exe 32 PID 2544 wrote to memory of 2484 2544 zVhgfgjbnv.exe 32 PID 2544 wrote to memory of 2484 2544 zVhgfgjbnv.exe 32 PID 2544 wrote to memory of 2484 2544 zVhgfgjbnv.exe 32 PID 2544 wrote to memory of 2484 2544 zVhgfgjbnv.exe 32 PID 2484 wrote to memory of 240 2484 zVhgfgjbnv.exe 33 PID 2484 wrote to memory of 240 2484 zVhgfgjbnv.exe 33 PID 2484 wrote to memory of 240 2484 zVhgfgjbnv.exe 33 PID 2484 wrote to memory of 240 2484 zVhgfgjbnv.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 8724⤵
- Loads dropped DLL
- Program crash
PID:240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d14c938c3dc37a1e53ffa556b22d177_JaffaCakes118.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD502a3dc4aeb09f2d0c48a47922bed2d73
SHA1ad59fb3b77bb02a2a38ddba31d617b17eeffb276
SHA2564a2d4f9ed9d34ba93219ad56c5d20902b89ecf8541afde59d1c321e0784f3b57
SHA51222bab6e49b3528b8e74b943c70541b1fbf4eb5b0d57924bf4bf4ae461fd5253e1d6ea3b7b1aff9263f1175d059c8daa4cb6236e869a16b2e585cc0ebe58f9e06
-
Filesize
276KB
MD53353c49b01e245c14103afb71443c724
SHA19d51ca208eb1d2d7e0b9bbd399af7e17bfcb2e97
SHA25629fc25aa5e1cae33ce7df5819cb4cd586784828039f4cda5b4f16583cf92a2d6
SHA512a636f77352ccf2a52778631f2c43365290ae9a7da8e686c28ebe259c63f910269b9f0df5d0595cd46d25f9aa64c84c6423e596fc771ef4c9e024be75448b50df