Analysis
-
max time kernel
165s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 15:48
Behavioral task
behavioral1
Sample
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
eb6b6b4f0970c825bbde733784027a52
-
SHA1
33e928ccbe9fb3088a0e94ece28b39cc9ccac8ef
-
SHA256
c9cf9521886aaa99c317b33c9fd5a8f82be1fe61d8616bc6ce8a10c4d26b6e21
-
SHA512
debe1809b3f8d0011979a852bc6dd7c63ea1e1b1648c66f1db611caf27ac5c988c384bdfaebaef8f59fc1750954675270057e1949917752b38ea7baad6fa24d6
-
SSDEEP
49152:RPO2xOD0wD6XH67JeVIE1iplrlhwaT4dn/kFjkOWS356NhOHYGWOBJZ8bCd4YIg:R22a0oJeKEwBln4dcFjCC6NhEvWOvk
Malware Config
Extracted
cryptbot
bundky32.top
morfug03.top
-
payload_url
http://tobhay04.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2420-4-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot behavioral1/memory/2420-3-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot behavioral1/memory/2420-5-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot behavioral1/memory/2420-6-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot behavioral1/memory/2420-7-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot behavioral1/memory/2420-225-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot behavioral1/memory/2420-248-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot behavioral1/memory/2420-252-0x0000000000A00000-0x0000000001189000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2420-0-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-2-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-4-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-3-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-5-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-6-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-7-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-225-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-248-0x0000000000A00000-0x0000000001189000-memory.dmp themida behavioral1/memory/2420-252-0x0000000000A00000-0x0000000001189000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exepid process 2420 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exepid process 2420 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exepid process 2420 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe 2420 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\TouomNrqr\_Files\_Information.txtFilesize
8KB
MD5843d34957b75928c2fc0b98da004e564
SHA13a8a48f24954f19a28390a70830ea692e1f31a13
SHA256928e33bbf8a84cdb5fe894faecf646d771990fccb938653d637da94a0a063382
SHA512b61cf1974af0fdddbe6cbbc503dbfba9017c2c57183a2068f784d0c9565b87a9ced497cd46c4da6d8e3235c98e7f095efd8c6fe61ca939ea0c90ccf9c6741b8b
-
C:\Users\Admin\AppData\Local\Temp\TouomNrqr\_Files\_Screen_Desktop.jpegFilesize
51KB
MD50dfe9f34f0e57796f84d498e4464c646
SHA10bd779c9671471be6d6e0b27491fe4d70b8046e9
SHA256a3e10f71598857033faf857896df1f80ffac7ebf25269ba073ae43c8e9b5bc93
SHA512b6923b50004bf21fdab61f4c0d6207aac04ef3bbd01d9a29d9cc452f455b0320220544b064133a19830b49362208af6117252551c601c9046f483e2d8c1e1a6c
-
C:\Users\Admin\AppData\Local\Temp\TouomNrqr\files_\system_info.txtFilesize
744B
MD58345caf5712822c8cc33cf2999417969
SHA1d150e6151837a6ab997863500d455284e2188fd0
SHA2565b662ad03c07d527dacdbe4210fff53465f3aeebde4e61ee67db7367bb202f38
SHA51206cf94a9fe770f348124facb7e472754e64bf9337ccee96aa603bcf62cd6c2a28c544c006cdcd270d3106e0fe2b95cc829d02286bc4da3459eecd1cc33186267
-
C:\Users\Admin\AppData\Local\Temp\TouomNrqr\files_\system_info.txtFilesize
8KB
MD5162c8f646a6a4e1a09c6fe493745fc4a
SHA11200a1f0c88980b4914ec6b53a00929bb7afa88b
SHA2566e607ecb1a7e8b9b2c19a3998e4108f79b1a253ad5e758953258482dcde2ba77
SHA51237ce3a82fa275df5d6af022d2770049e80f3f76576e9cb4248ebfe9051e94e52e48a73bdfd04feee5a27a0cdf3ee59080b55c9802139558778c4c1c24a5c3c85
-
C:\Users\Admin\AppData\Local\Temp\TouomNrqr\pidExTpjNdFQx.zipFilesize
44KB
MD5674149611941a643af8ba229d5b457b3
SHA14f15e8525ba0fbb14b9d162db5b15692f3c61048
SHA256898910272310d099db79c47eb9e3dbc76ecaa625a2ad33aacadcd4c8208aaa5b
SHA5125598cca9623540b7ffaaf6b48a29dbe14d299fc8ac2803449dc74d61615cbe205eb1b8dcc639b40231aeccb7680ba99f4c5316516d535d280218d3c189030442
-
memory/2420-5-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-6-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-7-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-220-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/2420-4-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-2-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-1-0x0000000077480000-0x0000000077482000-memory.dmpFilesize
8KB
-
memory/2420-0-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-225-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-229-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/2420-3-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-248-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB
-
memory/2420-252-0x0000000000A00000-0x0000000001189000-memory.dmpFilesize
7.5MB