Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 03:29

General

  • Target

    f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe

  • Size

    675KB

  • MD5

    f295b6024d248163f14b87bc6aed9db5

  • SHA1

    b16d00942ca755d99f061ec63411c5cdd521f64c

  • SHA256

    03f1f8cb65e89c21c87f0e04c65dace4d48c708dd175056e581516bd94c50bfa

  • SHA512

    c52252e801997ae01487cb57e3eec2b2b92303a49fceba676fd746c5c2e6d8c6fc8d60c25f7de07794893c0d43ebcc6b786eea68188df222e980df8542a49063

  • SSDEEP

    12288:JmfR9Cu6Hml1T4pOJK6DzMJKtB61OPu7faLc5kSEkwVgyo22tDtuejoWXNj0p6Pj:YCu6Hmz456fMJI8O4hY+yoltDwetKp6

Malware Config

Extracted

Family

cryptbot

C2

ewaqly46.top

morjau04.top

Attributes
  • payload_url

    http://winhaf05.top/download.php?file=lv.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    PID:2972

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\XtZP7xudYZe.zip
    Filesize

    29KB

    MD5

    efaf39c84327ca0f1b7fbc30f98ece17

    SHA1

    736e21f7f73a55d2e05d5820924cecbe5156c2b6

    SHA256

    be98d5da036d3f5e1267adf6ddc82df36ff2436265b33bb3d8e1293ce1c8f0b8

    SHA512

    4e2bd1fa3abd7c4589eb4aac20f81a4f5104ee0712611601ad1ac71e243615de7584b010617e731ae2f788ea19c112aec948e4d00cbf1e1f7a9c6c1d6fb895be

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\_Files\_Information.txt
    Filesize

    1KB

    MD5

    47ee851f087e23b9f39c8c2c7593df0f

    SHA1

    8f8314f101f035f4c86f2b7e0c5b09ae16af5efa

    SHA256

    1c62de91906d4f80b4836da0c06a55018e5918d1bbd251eaffabe5c268399d79

    SHA512

    ef88cea95227d7ef0ef4171847dd54320990e9ed8dad991aaf803857cad2cd6728becde6d29cb7ced4e1506b040fd962b504e6cca863cab756336c43499b2961

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\_Files\_Information.txt
    Filesize

    3KB

    MD5

    65ee2a93acb635fa4d1b77f873dacff0

    SHA1

    f931ea21fbb619b05f2dac29702ce89b13951a33

    SHA256

    5afbc3b7bc3922fabc3d2a4d458b18709964c2da5bfe11b7febee7eba20c1cdb

    SHA512

    f169e8bb953415072f010dc9e1fe064fb465634d72f4197f87894907a7ac7ba697be3ae8929d40c6dffef50378e8de8d394f1cbda87632d57c88d946deb1f528

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\_Files\_Information.txt
    Filesize

    3KB

    MD5

    300e570782acd9574caba7b5d91edfbb

    SHA1

    9dcd16404dc491ab0840a64e7cc893cd9817100f

    SHA256

    2b8b0d44fe68515a1e1fbc180a824115e8c0b41003c52131be28a9eff792a2f1

    SHA512

    e87f7b866bf87b86838dc4880e00982eeb1ad8b8e1322040f5515d91ecce5358f5145421b682a027cfb67cd3d6980b7b75421ec8d425fb7a2d1267774cc1e088

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\_Files\_Information.txt
    Filesize

    4KB

    MD5

    a1158b5f7511bc9edd741944da5d6c48

    SHA1

    90e7d5d59429cd85256d815e7269e05fd478f6cb

    SHA256

    f1de8928daadb56a0298c69f666a91f773c7bdfc7243aa06efd67b7e28157d14

    SHA512

    127ae7178d58966ad0f0942bbb121354db5ac9b7644f3e3c6525779ca2113d64c60f87d0683a60bd980733b68b16c3ab9bbf83c7d1e0d26b5712b76181b6d2c6

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\_Files\_Screen_Desktop.jpeg
    Filesize

    37KB

    MD5

    17cf069692f8b4089cba58c7272d1616

    SHA1

    baf84dd07239577102785f9514f5255eb92c7948

    SHA256

    c1ea7d124851206f42d3c10f3a4f59f46a1fa2e1ec06fe72ef46385915c5dcc5

    SHA512

    084de704f889734b113500ec0ebfdc16b1d1ddd6110deb52359a64962a2844c0e12709af9b189dfb1d07c0cbd4ddb80333c6ef8357a274b3ce34dc267f8ee896

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\files_\system_info.txt
    Filesize

    1KB

    MD5

    bfba08859c2b5cb30d559e3d9fa539ef

    SHA1

    c59359959683bb44aeb6a6886e194d5f9dbc7d20

    SHA256

    606cef2b76be0fb86b52139260f10b8f8062981b82b0b54ca13722a947e1a72e

    SHA512

    b7b3b49b05b768f3aeebb91567db0d82a1102a2e142ea64d9881b0d48029324ea1d2910d389c6df44f0d4e10026b4094852025cb0e89820db470f5f8a470d85b

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\files_\system_info.txt
    Filesize

    3KB

    MD5

    89db5c84d8eb3ebc0b4b8be019b7c971

    SHA1

    05fda31ad0f419b021037f4eb786a0454deee150

    SHA256

    9d92a5db67f46b3835d84ff989558ce9c1675a4b8ac96fef33bab0a4dfa22bb5

    SHA512

    f4317c7485768d7a74bc50a40aa31aa906448d38139d4704f8bc705218bc51972988703c3e56e3593a229258d285d4df5001dc6a1c6a7d0a9a978a5c3cc628bf

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\files_\system_info.txt
    Filesize

    3KB

    MD5

    634d808efe011f573eef615c0226497d

    SHA1

    48387e74bf43f1714ef8f349faf12f91d179671f

    SHA256

    c0a3dd88cc93b36d8fedd97010ee3b0697eabb05a525a9f8e097a715544372dd

    SHA512

    a99dd2864fc75fe75f7674aed2108f14b6e3e5e2ef3e9f8e39b63f3ddef36074e6194f794dda54f7ab6e3494567f60fc884109f3fdd83ba046fc57e60a6e864f

  • C:\Users\Admin\AppData\Local\Temp\LYRRvtYM\files_\system_info.txt
    Filesize

    4KB

    MD5

    cf00e87805ad6691394324bf13da5020

    SHA1

    cb12351d5bcf7cf42712e6a07ac6ca48fefe380f

    SHA256

    5e8b816db0dc86cdb2bcf6fc286520c8e618991ed6cd1fd380290fa1d40b292c

    SHA512

    b9dfbf0fb0cb049d92b00589a921070d306ee8f25ba55640abbd143fc67db1976be35dd901c5f671744acb28e8f3e7ffc31138e49ec3af0109e8a4b2d68f5123

  • memory/2972-4-0x0000000004D30000-0x0000000004D31000-memory.dmp
    Filesize

    4KB

  • memory/2972-2-0x0000000000400000-0x00000000032A4000-memory.dmp
    Filesize

    46.6MB

  • memory/2972-1-0x0000000003390000-0x0000000003490000-memory.dmp
    Filesize

    1024KB

  • memory/2972-222-0x0000000000400000-0x00000000032A4000-memory.dmp
    Filesize

    46.6MB

  • memory/2972-224-0x0000000003390000-0x0000000003490000-memory.dmp
    Filesize

    1024KB

  • memory/2972-3-0x0000000000310000-0x00000000003B0000-memory.dmp
    Filesize

    640KB

  • memory/2972-227-0x0000000004D30000-0x0000000004D31000-memory.dmp
    Filesize

    4KB