Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
0140a745a3d50602f682794dee1d706a
-
SHA1
92e80b0de3d4e7a2f26269324c7fc1018d066fdf
-
SHA256
ee5b09954a950e20e33ce451943a8c5175952debebc38e9e2ef936919024ac0d
-
SHA512
41d6b17efc1cbec2433feb2dd0b39bf51c16f6c2cc384ce975b3d44c4286f8c00caa9209360eb656221ef6b67dc867ddd5b1f81bd71869fdefdaac15058ae4f7
-
SSDEEP
49152:ysUNRFq5IlO39JyC1lgRlX2S3aTYg0dB8nrDpH:yZdqEONJz16vmS3lg5N
Malware Config
Extracted
cryptbot
bibinene03.top
moraass05.top
Signatures
-
CryptBot payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/3076-6-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-12-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-219-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-221-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-222-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-225-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-227-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-231-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-234-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-236-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-239-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-242-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-245-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-248-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-253-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-256-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot behavioral2/memory/3076-259-0x0000000000340000-0x0000000000855000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exepid process 3076 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exepid process 3076 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe 3076 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
0140a745a3d50602f682794dee1d706a_JaffaCakes118.exepid process 3076 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe 3076 0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0140a745a3d50602f682794dee1d706a_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4044 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DcWcpgoRr2\_Files\_Information.txtFilesize
1KB
MD52ccdcf5bd1f656c5d9ee67c8ac1edba5
SHA1a877bd70f7f2ec9840048ee36c0d931db48cb466
SHA256fa14c0d6d16b3afc2244a5cd34f3f4debf7921d4c9be0fa16508df6572e3a86f
SHA5125fff9da8980ded8bd1f7c8e5eda9e596fcf3158a989f34f9f5e956d6a478101d68ee32cb2c3f644dd97006d603ab6e6c33029be06b70583f47ae1818a3693382
-
C:\Users\Admin\AppData\Local\Temp\DcWcpgoRr2\_Files\_Information.txtFilesize
7KB
MD566c23857940ccf433991e38f443b3ba7
SHA18ad12017596c467c5eb20d1cb377a1738c753bbc
SHA2564b76912634fa9c8e37258cf4fccb4a3b14389e94574545e8c83a01a5c245bb98
SHA5128686b83d631644d34ac6d9bf0a37fae2113045b47767755073cb31a4231ea0fe3605f1bb4a5ba54225d81e4f787cfe9fb54975dcd471066eb41394c56d077ba1
-
C:\Users\Admin\AppData\Local\Temp\DcWcpgoRr2\_Files\_Screen_Desktop.jpegFilesize
46KB
MD570c111759b5d3ae00a1c353a55ad95b6
SHA1e3a22cd9e7c39050b8073d4d696cd3297aee58c0
SHA256a39b00d08959ac47097b4b692c8d04daf2e5c9c5e4cf2388481ede673f2d7347
SHA5126195536c41359c4373c1160d26837995d7a7f9d2ccefe933a2a7926b85aa9acad58f505fa959b76d1f07b78dcd97cc30690fa6d5d70be34a0f3bdd6da740d40c
-
C:\Users\Admin\AppData\Local\Temp\DcWcpgoRr2\cR5NBBUR.zipFilesize
40KB
MD5386dde9b933b4db0de73d4188f49a9d8
SHA16567988f54de06ea1f1205230d7dbc30615249d9
SHA2560429a67f8e47f9cf3fbc451a21aa7107871d2a5f589f7acacd815f01e6635c53
SHA512c868759cb739312b5fd9914af704621662340664c9804798c86bf71a4f4f016a038c3f495e7646cc6d25a02614a66f5b02293f591e3f417c036adfab8b8b4aeb
-
C:\Users\Admin\AppData\Local\Temp\DcWcpgoRr2\files_\system_info.txtFilesize
7KB
MD5f2c677f96393e64e8b79a6c60ca1d8be
SHA1a1521b0124c81c6524a8e324594db1ae967a9974
SHA256293257c809d6df1512f4dab2ef84345a6b439be3662408b3d3afeec0a6f59887
SHA512f39ec99521e78bff569ea233b7a629573e780a1a7d8d6b5bbbc6c9694957595531497acf6506d59651b6df14c628e4e6a9e0cdd43a3445472e4c695569197006
-
C:\Users\Admin\AppData\Local\Temp\DcWcpgoRr2\files_\system_info.txtFilesize
7KB
MD5386857fe1e17032ea9eb7bd00970fbf3
SHA16e6ccf08359db7c532ab798b9159298887bab716
SHA2569d7a7c332939f27ec40f7ce8cbc4d5ebb32a6d2bd6eb853f9510cff0c65dc992
SHA512df1fac4380f044a626cb5150742901c7ddabc9e77cf3332967e4b7f681cb078802386fe1c82027f453ca56e9c1c5fc1f25ab62213cd6d455b4e3bd7f48777597
-
C:\Users\Admin\AppData\Local\Temp\DcWcpgoRr2\kMZDweuQN0cJ1.zipFilesize
40KB
MD5fc5f1fe4e3c99cb0a58dcd224b59d174
SHA15d78aed00b07bce001d08e81eabf7b4aa598525d
SHA2567781acdbddd9a78075b0adb36218f408c7e0d41021844f680822cfc244876c68
SHA512aaf2e7fbbad848a688cd37e4fdf0b59e2efba0eb4e38cbc1b3e3ef7c6d4df8f040623ca08ab0eb4f2124696a2a9124c7736f58688b391ff923af65eaa97b6d3c
-
memory/3076-7-0x0000000005390000-0x0000000005391000-memory.dmpFilesize
4KB
-
memory/3076-3-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/3076-0-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-10-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/3076-11-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/3076-12-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-20-0x00000000053A0000-0x00000000053A1000-memory.dmpFilesize
4KB
-
memory/3076-9-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/3076-6-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-5-0x00000000053D0000-0x00000000053D1000-memory.dmpFilesize
4KB
-
memory/3076-2-0x00000000053B0000-0x00000000053B1000-memory.dmpFilesize
4KB
-
memory/3076-4-0x00000000053E0000-0x00000000053E1000-memory.dmpFilesize
4KB
-
memory/3076-219-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-221-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-222-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-8-0x00000000053F0000-0x00000000053F1000-memory.dmpFilesize
4KB
-
memory/3076-225-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-227-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-231-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-234-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-236-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-239-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-242-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-245-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-248-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-253-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-256-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB
-
memory/3076-1-0x0000000077954000-0x0000000077956000-memory.dmpFilesize
8KB
-
memory/3076-259-0x0000000000340000-0x0000000000855000-memory.dmpFilesize
5.1MB