Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 07:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe
-
Size
598KB
-
MD5
1597ffd4b1262d1d25f34f0de7aed129
-
SHA1
936fcc97ca39f39aaa05635b95da5a7698785546
-
SHA256
f659031b488c5c105016d60cfc9da09ea0a68f43b957e8b264461e75bcbf6f4b
-
SHA512
29b611766ee35dbf286a71462d845f54897b21c583e24eeb4cbcf5bc387f2468d0ebdb1712f6fc54b3a122d2a1fec122f7c9af7faeda31e6e0625cdff77d9dad
-
SSDEEP
12288:FSfa9ALNWgoeJWD8YX+l9q2xyjiXsCIHJrOiv3QfYXge8ERosA:FSCCVWoQ+kZCaTuYX3u
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
scarsa.ac.ug
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Oski family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe -
Executes dropped EXE 2 IoCs
pid Process 4840 Wrygpxuoiconsoleapp4.exe 1920 Wrygpxuoiconsoleapp4.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2068 set thread context of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 4840 set thread context of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4520 1920 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wrygpxuoiconsoleapp4.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 4840 Wrygpxuoiconsoleapp4.exe 4840 Wrygpxuoiconsoleapp4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe Token: SeDebugPrivilege 4840 Wrygpxuoiconsoleapp4.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1948 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 87 PID 2068 wrote to memory of 1948 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 87 PID 2068 wrote to memory of 1948 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 87 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 2068 wrote to memory of 2544 2068 JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe 88 PID 1948 wrote to memory of 4840 1948 WScript.exe 89 PID 1948 wrote to memory of 4840 1948 WScript.exe 89 PID 1948 wrote to memory of 4840 1948 WScript.exe 89 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92 PID 4840 wrote to memory of 1920 4840 Wrygpxuoiconsoleapp4.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Cluexwrmdbpntfny.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exe"C:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exeC:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exe4⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 12965⤵
- Program crash
PID:4520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1597ffd4b1262d1d25f34f0de7aed129.exe2⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1920 -ip 19201⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD56b0154ea182640615f31706030f68c68
SHA19ffdfde77609c938a2d34483a9d6066f22bc791b
SHA25678c821ffafd8ccb109314e16cee0e1e4d69d76aaa87aed8e750d15e7816b1043
SHA512a815ae4b298510b91a9a06cab1068f85326394b9b250484376058ae127b2d5e97d31f31a0d85a6848200f71f4565c7a5f2934427abec52bc245198e171634e28
-
Filesize
311KB
MD5960586bdf44ca1fcb8e80cd5846a77b6
SHA150d76e219c07a9dc6d7fd827c9fe9f3ef050cfcb
SHA25692e2cc7980fc342c59860a0e6a16c73f10ee3b0caac53530121e89448933d305
SHA5121e2676c0357d3d1c1177d36816c84c5157956afc2d0ef30aa4fd0ea3aef3150cec31e3a9cdcd31a6d71b8cd2429973e27584e7a9b8003be475c935e31e1a283b