Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118.ps1
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118.ps1
Resource
win10v2004-20240419-en
General
-
Target
1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118.ps1
-
Size
1.9MB
-
MD5
1fa8859a60ac751d2f902ba0ba4f7f8d
-
SHA1
71ecc132df74adf48989f6074d505120f3af7b60
-
SHA256
79abefa5e6692a3096c000815a138d47c43d361b93ff73c2b13a1c8b77321543
-
SHA512
3452de68d6022daa980f9f82f918107e6d7c28d8d8cf5bb96b66917485d9e6d702fe44f91bd2fa8fc09097201cf927bb2ab71482759bca59b2660fff7ce1e598
-
SSDEEP
24576:BKQruemcQ8gZaiZF3xLUGWyWrPwBAOc1sz7LDOjLO/r30/gRo3zDuvxeS7U:wQg3jcwBhuIj0oRXV4
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
tomasisa.ug
Extracted
raccoon
089d42bf776aba2e6326c9c557e433da6c3501f4
-
url4cnc
https://telete.in/jrikitiki
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer V1 payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4440-65-0x0000000000400000-0x0000000000497000-memory.dmp family_raccoon_v1 behavioral2/memory/4440-67-0x0000000000400000-0x0000000000497000-memory.dmp family_raccoon_v1 behavioral2/memory/4440-73-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qia.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation qia.exe -
Executes dropped EXE 6 IoCs
Processes:
qia.exeJvdacbs.exePkdfshbas.exeJvdacbs.exePkdfshbas.exeqia.exepid process 1800 qia.exe 3468 Jvdacbs.exe 3232 Pkdfshbas.exe 3296 Jvdacbs.exe 4776 Pkdfshbas.exe 4440 qia.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
Jvdacbs.exePkdfshbas.exeqia.exedescription pid process target process PID 3468 set thread context of 3296 3468 Jvdacbs.exe Jvdacbs.exe PID 3232 set thread context of 4776 3232 Pkdfshbas.exe Pkdfshbas.exe PID 1800 set thread context of 4440 1800 qia.exe qia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3064 4776 WerFault.exe Pkdfshbas.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 3408 powershell.exe 3408 powershell.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
Jvdacbs.exePkdfshbas.exeqia.exepid process 3468 Jvdacbs.exe 3232 Pkdfshbas.exe 1800 qia.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3408 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
qia.exeJvdacbs.exePkdfshbas.exepid process 1800 qia.exe 3468 Jvdacbs.exe 3232 Pkdfshbas.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
powershell.exeqia.exeJvdacbs.exePkdfshbas.exedescription pid process target process PID 3408 wrote to memory of 1800 3408 powershell.exe qia.exe PID 3408 wrote to memory of 1800 3408 powershell.exe qia.exe PID 3408 wrote to memory of 1800 3408 powershell.exe qia.exe PID 1800 wrote to memory of 3468 1800 qia.exe Jvdacbs.exe PID 1800 wrote to memory of 3468 1800 qia.exe Jvdacbs.exe PID 1800 wrote to memory of 3468 1800 qia.exe Jvdacbs.exe PID 1800 wrote to memory of 3232 1800 qia.exe Pkdfshbas.exe PID 1800 wrote to memory of 3232 1800 qia.exe Pkdfshbas.exe PID 1800 wrote to memory of 3232 1800 qia.exe Pkdfshbas.exe PID 3468 wrote to memory of 3296 3468 Jvdacbs.exe Jvdacbs.exe PID 3468 wrote to memory of 3296 3468 Jvdacbs.exe Jvdacbs.exe PID 3468 wrote to memory of 3296 3468 Jvdacbs.exe Jvdacbs.exe PID 3468 wrote to memory of 3296 3468 Jvdacbs.exe Jvdacbs.exe PID 3232 wrote to memory of 4776 3232 Pkdfshbas.exe Pkdfshbas.exe PID 3232 wrote to memory of 4776 3232 Pkdfshbas.exe Pkdfshbas.exe PID 3232 wrote to memory of 4776 3232 Pkdfshbas.exe Pkdfshbas.exe PID 3232 wrote to memory of 4776 3232 Pkdfshbas.exe Pkdfshbas.exe PID 1800 wrote to memory of 4440 1800 qia.exe qia.exe PID 1800 wrote to memory of 4440 1800 qia.exe qia.exe PID 1800 wrote to memory of 4440 1800 qia.exe qia.exe PID 1800 wrote to memory of 4440 1800 qia.exe qia.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Public\qia.exe"C:\Users\Public\qia.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"4⤵
- Executes dropped EXE
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"4⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 13045⤵
- Program crash
PID:3064 -
C:\Users\Public\qia.exe"C:\Users\Public\qia.exe"3⤵
- Executes dropped EXE
PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 47761⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD562835e700428e242e2b3b9a4862504ad
SHA1fc5843c3348ae8507e15e5ccf26de32e8b4f9fee
SHA2563c5a48ddae13424e0a7658c6aa6000c6b7ab4973cbb1ec171f15857dbafa20ef
SHA5124ca0dbd01d4a0d942b9e45ba48fb91b50691353b58fe1eb9e23a2cb7af19dce4c17ef0c001e0472214acb8d524acdcff8b0ad7ec47c1b4156ca78d78f477c4ca
-
Filesize
428KB
MD5ef0d6ae2da95b84e9571375e120c2af4
SHA17c6fb180c3d041780ee58a14528cdb035bac4d87
SHA25674c58a2deb846ff9f62fbc2a3e43884883251b459d772038a2d1539df7ff9c89
SHA512c2fc4430c175df18abf959e9e4a6d724ef4ad7a3542d3027de5bde7d445131f2f169a43bd3c91d79cfa9654244c3bcd38e6013006e3699ceebc7a45712e1f0c0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.4MB
MD57afa1658a6f338122d355720b4864ed2
SHA1d2d6012eba6cea513f1d7b267b562b35b738d46e
SHA25638d0f6d2d2ccd86e63232e4c702202b167be54dd3c8e21d289f21f4d3775a1e5
SHA512a74585ff241320d340a8242d53ed58d853e25b85b3c5ccce0019c8fdcbc3e8df1b01eadd73ccf820bf193852b527702d4f2c95ddcbb0b6e1456d375e04839c2d