Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe
-
Size
494KB
-
MD5
73b8f1ec16231a14550fc51007ad07d3
-
SHA1
63f959b1df1e38137b14f5f14cb216b8c96dbd84
-
SHA256
5389a958986f6ceccaa9e44006852becbccabfb07f126d69e6b031227fb0b487
-
SHA512
b807774fcd2031715a1249b06138afe88ccc032857fecc0bea259e3be34e2e29a785e6c4ae314e7262872ca1309cd6bdf252cb3bf61efea67ab1ba08c500962b
-
SSDEEP
12288:tozjuOV98Gvx2jn5CEyUFqSP5NDUGvbbm:tgjV98GvUj5C8F35N5jbm
Malware Config
Extracted
oski
no1geekfun.com/surce/a/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\build.exe family_stormkitty behavioral1/memory/784-145-0x0000000000CA0000-0x0000000000CC2000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 4 IoCs
Processes:
cmd...exechrmuim2.exechrmuim.exebuild.exepid process 2120 cmd...exe 1948 chrmuim2.exe 2728 chrmuim.exe 784 build.exe -
Loads dropped DLL 16 IoCs
Processes:
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.execmd...exechrmuim2.exebuild.exechrmuim.exeWerFault.exepid process 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe 2120 cmd...exe 2120 cmd...exe 1948 chrmuim2.exe 1948 chrmuim2.exe 1948 chrmuim2.exe 2120 cmd...exe 1948 chrmuim2.exe 784 build.exe 784 build.exe 2728 chrmuim.exe 2728 chrmuim.exe 868 WerFault.exe 868 WerFault.exe 868 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 868 2728 WerFault.exe chrmuim.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
build.exechrmuim.exe73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.execmd...exechrmuim2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrmuim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd...exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrmuim2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
chrmuim2.execmd...exebuild.exedescription pid process Token: SeDebugPrivilege 1948 chrmuim2.exe Token: SeDebugPrivilege 2120 cmd...exe Token: SeDebugPrivilege 784 build.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exechrmuim2.execmd...exechrmuim.exedescription pid process target process PID 2268 wrote to memory of 2120 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe cmd...exe PID 2268 wrote to memory of 2120 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe cmd...exe PID 2268 wrote to memory of 2120 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe cmd...exe PID 2268 wrote to memory of 2120 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe cmd...exe PID 2268 wrote to memory of 2120 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe cmd...exe PID 2268 wrote to memory of 2120 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe cmd...exe PID 2268 wrote to memory of 2120 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe cmd...exe PID 2268 wrote to memory of 1948 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe chrmuim2.exe PID 2268 wrote to memory of 1948 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe chrmuim2.exe PID 2268 wrote to memory of 1948 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe chrmuim2.exe PID 2268 wrote to memory of 1948 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe chrmuim2.exe PID 2268 wrote to memory of 1948 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe chrmuim2.exe PID 2268 wrote to memory of 1948 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe chrmuim2.exe PID 2268 wrote to memory of 1948 2268 73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe chrmuim2.exe PID 1948 wrote to memory of 2728 1948 chrmuim2.exe chrmuim.exe PID 1948 wrote to memory of 2728 1948 chrmuim2.exe chrmuim.exe PID 1948 wrote to memory of 2728 1948 chrmuim2.exe chrmuim.exe PID 1948 wrote to memory of 2728 1948 chrmuim2.exe chrmuim.exe PID 1948 wrote to memory of 2728 1948 chrmuim2.exe chrmuim.exe PID 1948 wrote to memory of 2728 1948 chrmuim2.exe chrmuim.exe PID 1948 wrote to memory of 2728 1948 chrmuim2.exe chrmuim.exe PID 2120 wrote to memory of 784 2120 cmd...exe build.exe PID 2120 wrote to memory of 784 2120 cmd...exe build.exe PID 2120 wrote to memory of 784 2120 cmd...exe build.exe PID 2120 wrote to memory of 784 2120 cmd...exe build.exe PID 2120 wrote to memory of 784 2120 cmd...exe build.exe PID 2120 wrote to memory of 784 2120 cmd...exe build.exe PID 2120 wrote to memory of 784 2120 cmd...exe build.exe PID 2728 wrote to memory of 868 2728 chrmuim.exe WerFault.exe PID 2728 wrote to memory of 868 2728 chrmuim.exe WerFault.exe PID 2728 wrote to memory of 868 2728 chrmuim.exe WerFault.exe PID 2728 wrote to memory of 868 2728 chrmuim.exe WerFault.exe PID 2728 wrote to memory of 868 2728 chrmuim.exe WerFault.exe PID 2728 wrote to memory of 868 2728 chrmuim.exe WerFault.exe PID 2728 wrote to memory of 868 2728 chrmuim.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\cmd...exe"C:\Users\Admin\AppData\Local\Temp\cmd...exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrmuim2.exe"C:\Users\Admin\AppData\Local\Temp\chrmuim2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\chrmuim.exe"C:\Users\Admin\AppData\Local\Temp\chrmuim.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 8444⤵
- Loads dropped DLL
- Program crash
PID:868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD566f22a464294d8f1710b98093b963834
SHA1a038a73a8f60a21a0eaccfe3648ad8e6b0112e0d
SHA256d93793bd9b19ad1b14c60fff4ecd3d30b214f31b466b42f99acd858bf0a77283
SHA51299d437211618e6fc6f9c06d9ff1e859b3ec7e9518c3e060cb92bdc7f9064e0ffa9c6b89079bf164d60cbf933071b5a9eb80ff6a4a89f325f3bbc0adb0e930d0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
110KB
MD5198d38f9365499a5b3d62682b6c5afec
SHA1cdeb1cbfafdeef9749f5994608f454e04ce6e6b3
SHA256a56508a041a5b5870578d9f5a1db6ec7186a74a50b391bd6506e9b62022bdf2e
SHA5124c542522aaf95bf3b2e74c197c92bfd517b65c10f68f75e9379a054ab98b6d17dc7e41332aaf60622ac0a584ecc420d79e27fd6b98d4130f8810ffaf0a8096b3
-
Filesize
200KB
MD535958a7d85fc88a18f931ee14e6ec531
SHA1087fedd2ac4fe703da8ad32957998d1dffcb728b
SHA25673fbf9c783b7e3a941837995f1a5181eca114e8923d6cc7ffb362ea88a8d0ba3
SHA512de7cb672507d2c2c6de27301a36507939be19231ff97c1c062e2cfda354b4e89f42570f448f8f24e3d8714d6d651b484bc36a8f4dbd53c3e6b968ef002fdb489
-
Filesize
301KB
MD55e45692f423e4f683e1c246679e6d572
SHA1bdc1cf9aa3625fc0d514628a55c767c8ed07e17b
SHA256d40dedd7f637a1ef9703b582a6d536469d1cf62bddc1a462a9cceeb7f9194f13
SHA51293de1b3cc9601adc6af8c2bdedec1633dfd82cc6a09d327836df2af628423db52174e1d9f6a241045a9ef593f0edd65e2b3a2797a64cbed73b2c54231ba0692c
-
Filesize
254KB
MD5ac48ddde88a9241a4598c91a27e6ecff
SHA1baa6666d66fbeb3c9c23b98837d3566582bcfa1d
SHA2561abbd40c3e08f27a0d7e8f58a4c53c04e062267ed0200d92d2687954689139ab
SHA5121099f4dfd57d3ab06e18378e7e17fff390e68889c39360556368d70f28db314e6134df802c92cfd552b74d9e5ca1f1bad5f423befd63fdfad588a5b11c0cc0d0