Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
92821d6dd83105f5f2d08c43f28fa309
-
SHA1
93c72e2494705509b56ca93cea2448aff098cb6d
-
SHA256
dc3171271adef72e1faf51d68c3c76daaffa9f097ef6d51aa600c98f129209e8
-
SHA512
47c3a27b5a9fa6273d779ed8afffeb2bbbecab6420708f0ca36629932e1d910e06297839ca39ec01fe7e975a52ed12aaa0e781f5112870e1b7621722e1808c08
-
SSDEEP
24576:rs50Mmi16DJ14W3a+sGbSeEs50MaRfgLA5TmOKKs50MA2iQZLAdTmOKYLA9TmOKh:rs51AJ1/ks58fgCCKs5A2XaCYKCh
Malware Config
Extracted
raccoon
cf43f57ef5d1c064538f5f9d27891dc66c96dad8
-
url4cnc
https://telete.in/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
nadia.ac.ug
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer V1 payload 7 IoCs
resource yara_rule behavioral2/memory/3208-36-0x0000000000400000-0x0000000000498000-memory.dmp family_raccoon_v1 behavioral2/memory/3208-35-0x0000000000400000-0x0000000000498000-memory.dmp family_raccoon_v1 behavioral2/memory/3208-41-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral2/memory/3208-40-0x0000000000400000-0x0000000000498000-memory.dmp family_raccoon_v1 behavioral2/memory/3208-37-0x0000000000400000-0x0000000000498000-memory.dmp family_raccoon_v1 behavioral2/memory/3208-62-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral2/memory/3208-64-0x0000000000400000-0x0000000000498000-memory.dmp family_raccoon_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 1988 FVjhgtresfdbv.exe 3712 NHtrdsaghfDF.exe 1228 FVjhgtresfdbv.exe 5052 NHtrdsaghfDF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3256 set thread context of 3208 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 83 PID 3712 set thread context of 5052 3712 NHtrdsaghfDF.exe 84 PID 1988 set thread context of 1228 1988 FVjhgtresfdbv.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 972 1228 WerFault.exe 85 -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 3712 NHtrdsaghfDF.exe 1988 FVjhgtresfdbv.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 1988 FVjhgtresfdbv.exe 3712 NHtrdsaghfDF.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3256 wrote to memory of 1988 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 81 PID 3256 wrote to memory of 1988 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 81 PID 3256 wrote to memory of 1988 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 81 PID 3256 wrote to memory of 3712 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 82 PID 3256 wrote to memory of 3712 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 82 PID 3256 wrote to memory of 3712 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 82 PID 3256 wrote to memory of 3208 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 83 PID 3256 wrote to memory of 3208 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 83 PID 3256 wrote to memory of 3208 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 83 PID 3256 wrote to memory of 3208 3256 92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe 83 PID 3712 wrote to memory of 5052 3712 NHtrdsaghfDF.exe 84 PID 3712 wrote to memory of 5052 3712 NHtrdsaghfDF.exe 84 PID 3712 wrote to memory of 5052 3712 NHtrdsaghfDF.exe 84 PID 1988 wrote to memory of 1228 1988 FVjhgtresfdbv.exe 85 PID 1988 wrote to memory of 1228 1988 FVjhgtresfdbv.exe 85 PID 1988 wrote to memory of 1228 1988 FVjhgtresfdbv.exe 85 PID 3712 wrote to memory of 5052 3712 NHtrdsaghfDF.exe 84 PID 1988 wrote to memory of 1228 1988 FVjhgtresfdbv.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\FVjhgtresfdbv.exe"C:\Users\Admin\AppData\Local\Temp\FVjhgtresfdbv.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\FVjhgtresfdbv.exe"C:\Users\Admin\AppData\Local\Temp\FVjhgtresfdbv.exe"3⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 13404⤵
- Program crash
PID:972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\NHtrdsaghfDF.exe"C:\Users\Admin\AppData\Local\Temp\NHtrdsaghfDF.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\NHtrdsaghfDF.exe"C:\Users\Admin\AppData\Local\Temp\NHtrdsaghfDF.exe"3⤵
- Executes dropped EXE
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe"2⤵PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1228 -ip 12281⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5385e5b97d97b89cacff3594eafeb0e5e
SHA170e73110860c36c83c504f4804e3cebde2a618a1
SHA2567b02ca9b842110100cd0471c27498b46a2542507ffaee32086bdfa4fd9c736b3
SHA512f83f175846b8b674e140fff442ba8958bceb63fba2cdc2ab6c2b1e047e6c0d22c3f0ce36c9fcf44c7f744099a44fe9f497494d4e2eb47579af133c1b3dc20d83
-
Filesize
492KB
MD535bccedd18360d94a33d86c09af8480c
SHA1013ab842c5b2ded0a930fc3d4f59a13d3ff66dc0
SHA256ede4a3065bf86d3c92312a291f9776c231f728a32d59dcb1621bee320855ad9f
SHA51231611f22f437bd12a4536eab643f0bf06070c5fbaedae27fc0117f1a4afca1b52d2fbc16e1a77587a4d069448bf8f158c8bbff46cfefc5bc9eccafe5421abd6f