Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe
-
Size
432KB
-
MD5
6521a3753639b263d04fb559c67c7209
-
SHA1
4dcc4d52f8dba1a5bdb8e1132dc03fca8552c5bf
-
SHA256
c84f2ac6e626a212fa854025fccebdbf755ec135d0e02ab883713dcab716396e
-
SHA512
0c90533335389a2e88876e9a3fac576b5c4e0a1a590e401afc753b2136155cb36a077a9459e6cac9ad292f157cd8f2ddbde64934c13523926617d2d7775eb257
-
SSDEEP
6144:GU/I8xDWenaDOmjd91wir8zBowmGuT3xiTGN7EEpLdJF+UYELYGcJg65H0d9JqHJ:GU/IGWJN/1ws8txuT3xiSNbrMUF8GxfU
Malware Config
Extracted
oski
195.133.147.113
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1904 set thread context of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2540 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 98 PID 1904 wrote to memory of 2540 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 98 PID 1904 wrote to memory of 2540 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 98 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99 PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:4024
-