Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 10:46

General

  • Target

    73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe

  • Size

    494KB

  • MD5

    73b8f1ec16231a14550fc51007ad07d3

  • SHA1

    63f959b1df1e38137b14f5f14cb216b8c96dbd84

  • SHA256

    5389a958986f6ceccaa9e44006852becbccabfb07f126d69e6b031227fb0b487

  • SHA512

    b807774fcd2031715a1249b06138afe88ccc032857fecc0bea259e3be34e2e29a785e6c4ae314e7262872ca1309cd6bdf252cb3bf61efea67ab1ba08c500962b

  • SSDEEP

    12288:tozjuOV98Gvx2jn5CEyUFqSP5NDUGvbbm:tgjV98GvUj5C8F35N5jbm

Malware Config

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\cmd...exe
      "C:\Users\Admin\AppData\Local\Temp\cmd...exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1820
    • C:\Users\Admin\AppData\Local\Temp\chrmuim2.exe
      "C:\Users\Admin\AppData\Local\Temp\chrmuim2.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\chrmuim.exe
        "C:\Users\Admin\AppData\Local\Temp\chrmuim.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 1356
          4⤵
          • Program crash
          PID:2636
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3936 -ip 3936
    1⤵
      PID:4372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\msvcp140.dll

      Filesize

      9KB

      MD5

      ad1c220bba8b97e72947a809b005d524

      SHA1

      a9b796c58d020a27a78edc16c2cc363e5246e5a8

      SHA256

      784e2d06d16a3b96904a281febee19358ac1eafdea4f07ecc03032492de09bbb

      SHA512

      005647ebfde3b857c68ebe89854a7bb08a62ae38b669d92df7fbfa7e1e29d4813a2477d11410bfcda3c13f4ae240788c785b44601ffb80db759853dd61f63c5f

    • C:\Users\Admin\AppData\Local\Temp\build.exe

      Filesize

      110KB

      MD5

      198d38f9365499a5b3d62682b6c5afec

      SHA1

      cdeb1cbfafdeef9749f5994608f454e04ce6e6b3

      SHA256

      a56508a041a5b5870578d9f5a1db6ec7186a74a50b391bd6506e9b62022bdf2e

      SHA512

      4c542522aaf95bf3b2e74c197c92bfd517b65c10f68f75e9379a054ab98b6d17dc7e41332aaf60622ac0a584ecc420d79e27fd6b98d4130f8810ffaf0a8096b3

    • C:\Users\Admin\AppData\Local\Temp\chrmuim.exe

      Filesize

      200KB

      MD5

      35958a7d85fc88a18f931ee14e6ec531

      SHA1

      087fedd2ac4fe703da8ad32957998d1dffcb728b

      SHA256

      73fbf9c783b7e3a941837995f1a5181eca114e8923d6cc7ffb362ea88a8d0ba3

      SHA512

      de7cb672507d2c2c6de27301a36507939be19231ff97c1c062e2cfda354b4e89f42570f448f8f24e3d8714d6d651b484bc36a8f4dbd53c3e6b968ef002fdb489

    • C:\Users\Admin\AppData\Local\Temp\chrmuim2.exe

      Filesize

      301KB

      MD5

      5e45692f423e4f683e1c246679e6d572

      SHA1

      bdc1cf9aa3625fc0d514628a55c767c8ed07e17b

      SHA256

      d40dedd7f637a1ef9703b582a6d536469d1cf62bddc1a462a9cceeb7f9194f13

      SHA512

      93de1b3cc9601adc6af8c2bdedec1633dfd82cc6a09d327836df2af628423db52174e1d9f6a241045a9ef593f0edd65e2b3a2797a64cbed73b2c54231ba0692c

    • C:\Users\Admin\AppData\Local\Temp\cmd...exe

      Filesize

      254KB

      MD5

      ac48ddde88a9241a4598c91a27e6ecff

      SHA1

      baa6666d66fbeb3c9c23b98837d3566582bcfa1d

      SHA256

      1abbd40c3e08f27a0d7e8f58a4c53c04e062267ed0200d92d2687954689139ab

      SHA512

      1099f4dfd57d3ab06e18378e7e17fff390e68889c39360556368d70f28db314e6134df802c92cfd552b74d9e5ca1f1bad5f423befd63fdfad588a5b11c0cc0d0

    • memory/868-96-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/868-160-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/868-83-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/868-84-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/868-31-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/868-29-0x00000000049B0000-0x00000000049DE000-memory.dmp

      Filesize

      184KB

    • memory/868-32-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/868-28-0x0000000004A80000-0x0000000005024000-memory.dmp

      Filesize

      5.6MB

    • memory/868-94-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/868-24-0x00000000024B0000-0x00000000024E0000-memory.dmp

      Filesize

      192KB

    • memory/868-25-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/868-93-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/868-86-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/868-26-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/868-90-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/868-140-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/868-88-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/1820-163-0x0000000004A10000-0x0000000004A76000-memory.dmp

      Filesize

      408KB

    • memory/1820-162-0x0000000000160000-0x0000000000182000-memory.dmp

      Filesize

      136KB

    • memory/1820-174-0x0000000005CA0000-0x0000000005D32000-memory.dmp

      Filesize

      584KB

    • memory/2780-33-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-56-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-23-0x0000000002510000-0x000000000254A000-memory.dmp

      Filesize

      232KB

    • memory/2780-82-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-78-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-76-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-27-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/2780-137-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/2780-42-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-134-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/2780-117-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/2780-73-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-70-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-69-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-66-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-64-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-58-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-80-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-54-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-52-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-50-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-48-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-46-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-44-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-161-0x0000000073A70000-0x0000000074220000-memory.dmp

      Filesize

      7.7MB

    • memory/2780-40-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-38-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-36-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-34-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-30-0x0000000004A20000-0x0000000004A5A000-memory.dmp

      Filesize

      232KB

    • memory/2780-62-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-60-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB

    • memory/2780-22-0x0000000073A7E000-0x0000000073A7F000-memory.dmp

      Filesize

      4KB

    • memory/2780-74-0x0000000004A20000-0x0000000004A53000-memory.dmp

      Filesize

      204KB