Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe
-
Size
432KB
-
MD5
6521a3753639b263d04fb559c67c7209
-
SHA1
4dcc4d52f8dba1a5bdb8e1132dc03fca8552c5bf
-
SHA256
c84f2ac6e626a212fa854025fccebdbf755ec135d0e02ab883713dcab716396e
-
SHA512
0c90533335389a2e88876e9a3fac576b5c4e0a1a590e401afc753b2136155cb36a077a9459e6cac9ad292f157cd8f2ddbde64934c13523926617d2d7775eb257
-
SSDEEP
6144:GU/I8xDWenaDOmjd91wir8zBowmGuT3xiTGN7EEpLdJF+UYELYGcJg65H0d9JqHJ:GU/IGWJN/1ws8txuT3xiSNbrMUF8GxfU
Malware Config
Extracted
oski
195.133.147.113
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exedescription pid process target process PID 1904 set thread context of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exepid process 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6521a3753639b263d04fb559c67c7209_JaffaCakes118.exedescription pid process target process PID 1904 wrote to memory of 2540 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 2540 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 2540 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe PID 1904 wrote to memory of 4024 1904 6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe aspnet_regbrowsers.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6521a3753639b263d04fb559c67c7209_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-8-0x00000000747B0000-0x0000000074F60000-memory.dmpFilesize
7.7MB
-
memory/1904-6-0x00000000053E0000-0x00000000053EA000-memory.dmpFilesize
40KB
-
memory/1904-2-0x0000000002C80000-0x0000000002C86000-memory.dmpFilesize
24KB
-
memory/1904-3-0x0000000009E70000-0x000000000A414000-memory.dmpFilesize
5.6MB
-
memory/1904-0-0x00000000747BE000-0x00000000747BF000-memory.dmpFilesize
4KB
-
memory/1904-5-0x0000000005440000-0x00000000054D2000-memory.dmpFilesize
584KB
-
memory/1904-1-0x00000000009B0000-0x0000000000A20000-memory.dmpFilesize
448KB
-
memory/1904-7-0x00000000747BE000-0x00000000747BF000-memory.dmpFilesize
4KB
-
memory/1904-4-0x00000000747B0000-0x0000000074F60000-memory.dmpFilesize
7.7MB
-
memory/1904-9-0x00000000061B0000-0x00000000061E2000-memory.dmpFilesize
200KB
-
memory/1904-10-0x0000000005EA0000-0x0000000005EB4000-memory.dmpFilesize
80KB
-
memory/1904-16-0x00000000747B0000-0x0000000074F60000-memory.dmpFilesize
7.7MB
-
memory/4024-12-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4024-14-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4024-15-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4024-11-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB