Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 12:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe
-
Size
1012KB
-
MD5
2354d9753f0f741bd358dae604e48c3e
-
SHA1
f128c560612c22c30ff0a3593bb66794ae7774d5
-
SHA256
f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346
-
SHA512
f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b
-
SSDEEP
12288:hxt6hRd3GUju9Al4QMe89d18EbVAXMJrQF0p4v9TH9yzsN2j33+RgshWtqU59d3i:hxQhf3DcA78DbVAXWQF0p2hNIeQqU5w1
Malware Config
Extracted
oski
scarsa.ac.ug
Extracted
raccoon
b76017a227a0d879dec7c76613918569d03892fb
-
url4cnc
http://telegka.top/brikitiki
http://telegin.top/brikitiki
https://t.me/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Oski family
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral1/memory/2792-35-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2792-43-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2792-38-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2792-53-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2792-70-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 -
Raccoon family
-
Executes dropped EXE 4 IoCs
pid Process 2672 Vtergfds.exe 2532 Vereransa.exe 2844 Vereransa.exe 3056 Vtergfds.exe -
Loads dropped DLL 11 IoCs
pid Process 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 2532 Vereransa.exe 2672 Vtergfds.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2532 set thread context of 2844 2532 Vereransa.exe 34 PID 2756 set thread context of 2792 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 33 PID 2672 set thread context of 3056 2672 Vtergfds.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1052 2844 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vtergfds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vereransa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vtergfds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vereransa.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2532 Vereransa.exe 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 2672 Vtergfds.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 2672 Vtergfds.exe 2532 Vereransa.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2672 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 31 PID 2756 wrote to memory of 2672 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 31 PID 2756 wrote to memory of 2672 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 31 PID 2756 wrote to memory of 2672 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 31 PID 2756 wrote to memory of 2532 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 32 PID 2756 wrote to memory of 2532 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 32 PID 2756 wrote to memory of 2532 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 32 PID 2756 wrote to memory of 2532 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 32 PID 2532 wrote to memory of 2844 2532 Vereransa.exe 34 PID 2532 wrote to memory of 2844 2532 Vereransa.exe 34 PID 2532 wrote to memory of 2844 2532 Vereransa.exe 34 PID 2532 wrote to memory of 2844 2532 Vereransa.exe 34 PID 2532 wrote to memory of 2844 2532 Vereransa.exe 34 PID 2756 wrote to memory of 2792 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 33 PID 2756 wrote to memory of 2792 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 33 PID 2756 wrote to memory of 2792 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 33 PID 2756 wrote to memory of 2792 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 33 PID 2756 wrote to memory of 2792 2756 JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe 33 PID 2672 wrote to memory of 3056 2672 Vtergfds.exe 35 PID 2672 wrote to memory of 3056 2672 Vtergfds.exe 35 PID 2672 wrote to memory of 3056 2672 Vtergfds.exe 35 PID 2672 wrote to memory of 3056 2672 Vtergfds.exe 35 PID 2672 wrote to memory of 3056 2672 Vtergfds.exe 35 PID 2844 wrote to memory of 1052 2844 Vereransa.exe 38 PID 2844 wrote to memory of 1052 2844 Vereransa.exe 38 PID 2844 wrote to memory of 1052 2844 Vereransa.exe 38 PID 2844 wrote to memory of 1052 2844 Vereransa.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 7604⤵
- Loads dropped DLL
- Program crash
PID:1052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2354d9753f0f741bd358dae604e48c3e.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5bbc3d625038de2cc64cbfdb76e888528
SHA175b19ab88f8c23d0088252e8c725d4ceea56895a
SHA2563b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601
SHA5129014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465
-
Filesize
216KB
MD50a8854ddd119e42c62bf2904efb29c1c
SHA1986ab504ca3cc36fc0418516f26aabc4168224d6
SHA25669f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb
SHA512905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7