Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 10:46

General

  • Target

    73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe

  • Size

    494KB

  • MD5

    73b8f1ec16231a14550fc51007ad07d3

  • SHA1

    63f959b1df1e38137b14f5f14cb216b8c96dbd84

  • SHA256

    5389a958986f6ceccaa9e44006852becbccabfb07f126d69e6b031227fb0b487

  • SHA512

    b807774fcd2031715a1249b06138afe88ccc032857fecc0bea259e3be34e2e29a785e6c4ae314e7262872ca1309cd6bdf252cb3bf61efea67ab1ba08c500962b

  • SSDEEP

    12288:tozjuOV98Gvx2jn5CEyUFqSP5NDUGvbbm:tgjV98GvUj5C8F35N5jbm

Malware Config

Extracted

Family

oski

C2

no1geekfun.com/surce/a/

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\cmd...exe
      "C:\Users\Admin\AppData\Local\Temp\cmd...exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:784
    • C:\Users\Admin\AppData\Local\Temp\chrmuim2.exe
      "C:\Users\Admin\AppData\Local\Temp\chrmuim2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\chrmuim.exe
        "C:\Users\Admin\AppData\Local\Temp\chrmuim.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 844
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\msvcp140.dll

    Filesize

    9KB

    MD5

    66f22a464294d8f1710b98093b963834

    SHA1

    a038a73a8f60a21a0eaccfe3648ad8e6b0112e0d

    SHA256

    d93793bd9b19ad1b14c60fff4ecd3d30b214f31b466b42f99acd858bf0a77283

    SHA512

    99d437211618e6fc6f9c06d9ff1e859b3ec7e9518c3e060cb92bdc7f9064e0ffa9c6b89079bf164d60cbf933071b5a9eb80ff6a4a89f325f3bbc0adb0e930d0a

  • C:\Users\Admin\AppData\Local\Temp\Cab1D04.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1D27.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    110KB

    MD5

    198d38f9365499a5b3d62682b6c5afec

    SHA1

    cdeb1cbfafdeef9749f5994608f454e04ce6e6b3

    SHA256

    a56508a041a5b5870578d9f5a1db6ec7186a74a50b391bd6506e9b62022bdf2e

    SHA512

    4c542522aaf95bf3b2e74c197c92bfd517b65c10f68f75e9379a054ab98b6d17dc7e41332aaf60622ac0a584ecc420d79e27fd6b98d4130f8810ffaf0a8096b3

  • \Users\Admin\AppData\Local\Temp\chrmuim.exe

    Filesize

    200KB

    MD5

    35958a7d85fc88a18f931ee14e6ec531

    SHA1

    087fedd2ac4fe703da8ad32957998d1dffcb728b

    SHA256

    73fbf9c783b7e3a941837995f1a5181eca114e8923d6cc7ffb362ea88a8d0ba3

    SHA512

    de7cb672507d2c2c6de27301a36507939be19231ff97c1c062e2cfda354b4e89f42570f448f8f24e3d8714d6d651b484bc36a8f4dbd53c3e6b968ef002fdb489

  • \Users\Admin\AppData\Local\Temp\chrmuim2.exe

    Filesize

    301KB

    MD5

    5e45692f423e4f683e1c246679e6d572

    SHA1

    bdc1cf9aa3625fc0d514628a55c767c8ed07e17b

    SHA256

    d40dedd7f637a1ef9703b582a6d536469d1cf62bddc1a462a9cceeb7f9194f13

    SHA512

    93de1b3cc9601adc6af8c2bdedec1633dfd82cc6a09d327836df2af628423db52174e1d9f6a241045a9ef593f0edd65e2b3a2797a64cbed73b2c54231ba0692c

  • \Users\Admin\AppData\Local\Temp\cmd...exe

    Filesize

    254KB

    MD5

    ac48ddde88a9241a4598c91a27e6ecff

    SHA1

    baa6666d66fbeb3c9c23b98837d3566582bcfa1d

    SHA256

    1abbd40c3e08f27a0d7e8f58a4c53c04e062267ed0200d92d2687954689139ab

    SHA512

    1099f4dfd57d3ab06e18378e7e17fff390e68889c39360556368d70f28db314e6134df802c92cfd552b74d9e5ca1f1bad5f423befd63fdfad588a5b11c0cc0d0

  • memory/784-145-0x0000000000CA0000-0x0000000000CC2000-memory.dmp

    Filesize

    136KB

  • memory/1948-37-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-29-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-19-0x0000000000B60000-0x0000000000B9A000-memory.dmp

    Filesize

    232KB

  • memory/1948-79-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-22-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-21-0x00000000025B0000-0x00000000025EA000-memory.dmp

    Filesize

    232KB

  • memory/1948-25-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-83-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-33-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-41-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-44-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-74-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-69-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-64-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-48-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-52-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-60-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/1948-56-0x00000000025B0000-0x00000000025E3000-memory.dmp

    Filesize

    204KB

  • memory/2120-82-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-18-0x00000000020A0000-0x00000000020D0000-memory.dmp

    Filesize

    192KB

  • memory/2120-53-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-65-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-75-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-40-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-78-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-45-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-49-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-61-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-28-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-57-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-23-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-72-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-24-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-20-0x00000000020D0000-0x00000000020FE000-memory.dmp

    Filesize

    184KB

  • memory/2120-36-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-68-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB

  • memory/2120-31-0x00000000020D0000-0x00000000020F8000-memory.dmp

    Filesize

    160KB