Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 05:27

General

  • Target

    8d0665fe97012b30205ddd6a59b6845f_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    8d0665fe97012b30205ddd6a59b6845f

  • SHA1

    b101fe89f9aaf93e65fa13aa4b9911bdaa6fa7bc

  • SHA256

    e3904895453928a24306c37594dc8696540cb1079f814cdfca9c0a7c7be8bd99

  • SHA512

    a682b0ba0c84d3a14b19ad0b594b62dd482dc455c98c182aab03e83c4a885b902369cfc60b670e4757d2855855a3187d52a58c132ac4a8ae8beecc4e7393815c

  • SSDEEP

    12288:0+lpK46tGeGemWFuY8MGJrzXzK4glVlceHnIQSKi669mBNlmxwSQxuwY6jzN66sN:0sQYeUyQrj47c4HSKi3gBzmeVxT/EbN

Malware Config

Extracted

Family

oski

C2

projecty.ug

Extracted

Family

raccoon

Botnet

b4e45242569da9410c6a3061200cbf770a009d1f

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d0665fe97012b30205ddd6a59b6845f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d0665fe97012b30205ddd6a59b6845f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\Hgfkdfavc.exe
      "C:\Users\Admin\AppData\Local\Temp\Hgfkdfavc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\Hgfkdfavc.exe
        "C:\Users\Admin\AppData\Local\Temp\Hgfkdfavc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2716
    • C:\ProgramData\Pnjgfhetr.exe
      "C:\ProgramData\Pnjgfhetr.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\ProgramData\Pnjgfhetr.exe
        "C:\ProgramData\Pnjgfhetr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 764
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1728
    • C:\Users\Admin\AppData\Local\Temp\8d0665fe97012b30205ddd6a59b6845f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8d0665fe97012b30205ddd6a59b6845f_JaffaCakes118.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1964

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Pnjgfhetr.exe
    Filesize

    284KB

    MD5

    145f2cfb7f498f6f9fae5664116ddcfe

    SHA1

    93cb1679dd8a5f1fb6d446563d0554a1d2ba60f6

    SHA256

    98192167c160cbf73d39355c867960e958864411731a4c78de9db228fcea6cdc

    SHA512

    21c5a25623687b7b74c530846e25c098a0b94794bfad3f25ad78c35fbab5e1d98e1b8e301fcd68a1174a5aa87010a0d805945a3388747a31fc6332788ee4bfce

  • C:\Users\Admin\AppData\Local\Temp\Hgfkdfavc.exe
    Filesize

    240KB

    MD5

    d7be8c9620c9af4f1a4662e0c6b59c51

    SHA1

    4f4a89bdebe66097509781eaf23cf0262ba7d2f9

    SHA256

    4ab8a9f23218d646f91f16a7f750e20c727a343c81d7c8f410d107bdde7da2ad

    SHA512

    dc1843192632a9b2d6fa21ef45068ee7b2b8e995611d67ad7a5228e5a4fbf682fb08ba0bf580713a6b7385bf1b68625e3874336b983c18cf4afdd539443c79a6

  • memory/1964-37-0x0000000000400000-0x0000000000498000-memory.dmp
    Filesize

    608KB

  • memory/1964-52-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1964-36-0x0000000000400000-0x0000000000498000-memory.dmp
    Filesize

    608KB

  • memory/2192-22-0x0000000002660000-0x0000000002668000-memory.dmp
    Filesize

    32KB

  • memory/2192-2-0x00000000001C0000-0x00000000001C1000-memory.dmp
    Filesize

    4KB

  • memory/2504-28-0x0000000000240000-0x0000000000248000-memory.dmp
    Filesize

    32KB

  • memory/2516-24-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/2516-27-0x00000000003F0000-0x00000000003F8000-memory.dmp
    Filesize

    32KB

  • memory/2516-41-0x00000000003F0000-0x00000000003F8000-memory.dmp
    Filesize

    32KB

  • memory/2544-31-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/2544-38-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/2544-34-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/2544-40-0x0000000000400000-0x0000000000434000-memory.dmp
    Filesize

    208KB

  • memory/2544-59-0x0000000000400000-0x0000000000434000-memory.dmp
    Filesize

    208KB

  • memory/2544-61-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/2716-46-0x0000000000400000-0x0000000000425000-memory.dmp
    Filesize

    148KB

  • memory/2716-44-0x0000000000400000-0x0000000000425000-memory.dmp
    Filesize

    148KB

  • memory/2716-49-0x0000000000400000-0x0000000000425000-memory.dmp
    Filesize

    148KB

  • memory/2716-50-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB