Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-05-2024 12:11

General

  • Target

    3f6f1b87fc7750df9421200e9e0aa070_JaffaCakes118.exe

  • Size

    4.0MB

  • MD5

    3f6f1b87fc7750df9421200e9e0aa070

  • SHA1

    11cf49ecbb3b8ba5d76444cefd041435c95bfc47

  • SHA256

    3d0c53b85d752355b9185c5d43a96dc028f2a56e73fb3358dc6a7f0882329e4e

  • SHA512

    9a4e11817771ab6cbb17d2a21857f1f210eafb122df5fd55ae963595aae2263fcd8b6cbfa855f05e26b0e1a2a6f8ca751452cdc9bcdcee0fb44eed6f9763dbc5

  • SSDEEP

    98304:XoUyCR9OdQA9BKQ+SQQUH80pvgsRGVdgTsPC:Xo1H+A9BLM80dwrb6

Malware Config

Extracted

Family

cryptbot

C2

tuytee16.top

moriiikk08.top

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 15 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f6f1b87fc7750df9421200e9e0aa070_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f6f1b87fc7750df9421200e9e0aa070_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\CScript.exe
      "C:\Windows\system32\CScript.exe" "C:\Program Files (x86)\Mader\lase\Setup1.vbs" //e:vbscript //B //NOLOGO
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2636
    • C:\Program Files (x86)\Mader\lase\1.exe
      "C:\Program Files (x86)\Mader\lase\1.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:1644
    • C:\Program Files (x86)\Mader\lase\Setup1.exe
      "C:\Program Files (x86)\Mader\lase\Setup1.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\vnsrievgotrk.exe"
        3⤵
          PID:2992
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ymsawtldtf.exe"
          3⤵
            PID:1520

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Virtualization/Sandbox Evasion

      2
      T1497

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Discovery

      Query Registry

      5
      T1012

      Virtualization/Sandbox Evasion

      2
      T1497

      System Information Discovery

      3
      T1082

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Mader\lase\Setup1.vbs
        Filesize

        126B

        MD5

        3ffc26d751f79fb801ecbb715885e852

        SHA1

        f54da1552aabfbf68ef07fa98234a8a1ff789a16

        SHA256

        8816d2a6adff6e256c6f478c46b283991feeb28dedc384914fe35f14f673d5d6

        SHA512

        08e00923d92f9141ec09ed420738126883772e359e6fc2e703a293020d0bb42b915d2a9961ba03676ab2ad43d8f4563b46778e119f22007073b1d9f1124c0d24

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        9bca7d543cc344f541d8403690c9bc2f

        SHA1

        6b91115e62e00a19e3a61ce8fc192b2ce06cf5c0

        SHA256

        877e11d71f2bd36b233869a0275e3f0e67e7437fa438043f413d301db8e3531c

        SHA512

        e9a0ee887c13dd7ba5e52e05a8865f0137d6aacc9c800d7401cdbb09aebf95bff2e005e338dfe58e0303a5122f5d29a60277cfa2f41a6212aded4c65827c41ea

      • C:\Users\Admin\AppData\Local\Temp\Cab236A.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\PTx6OcwdD\RGQSYrry3lET.zip
        Filesize

        31KB

        MD5

        f5275fa3ca669ff78d3edd3343feb035

        SHA1

        164bf144c3bb507bb6ac247e00c026bb2221f567

        SHA256

        d043e974ed0872e4c6a865189d259499e08c6fb3b8246857f90d205374785206

        SHA512

        92d8c6c31e44f47d8c523b60143a820af69ebe60d3ff64daf99d1391d9d62b1b1f3c194f4c9301411803d793ca66f161d3690ec31e99218397da5211357c664f

      • C:\Users\Admin\AppData\Local\Temp\PTx6OcwdD\_Files\_Information.txt
        Filesize

        2KB

        MD5

        2032da333f0f4cfc1c06df7194ef5fbd

        SHA1

        df7cc8ea6a2419919f33dd098363be96a77d87da

        SHA256

        8f3b33430f99f46fba12d4d69ee8dc78a491a5763cb832a5e7a63a29095383d7

        SHA512

        2e2a63426df948c5e03aa4610c0d420982817557910f02661e8f0fb030d4c5df42a4b6a5c3c33db2227f91c23556eaa7d75dbd332500b872ee9cf5aafa75c649

      • C:\Users\Admin\AppData\Local\Temp\PTx6OcwdD\_Files\_Information.txt
        Filesize

        4KB

        MD5

        8c5838f63ed2d3ad22dd552a4dd57390

        SHA1

        1efb3598eeca6fb7e0ba53724c0ca76d2c6eb215

        SHA256

        7420a9f2221de8104675abf58aa77aa88e9ccfbf17bed2f3b36aa4097cbcc1eb

        SHA512

        a3f2e8bbb12171bc4619451a6871efc27c7291cdcae81df37c1054942ed4ba8184f86fa9ffa4228fbb47ea62af6a48e0eb2c58310b2c6230ccc7a09bec2f075c

      • C:\Users\Admin\AppData\Local\Temp\PTx6OcwdD\_Files\_Screen_Desktop.jpeg
        Filesize

        39KB

        MD5

        81e35b428d500d64fd38eb806e9ff619

        SHA1

        fd1d0833f0c61848651d5bbfc7ce8cf3ce469582

        SHA256

        ed90919b0af9820c9a3222092dcd3750841dc5e6669478dccff04f84525d4025

        SHA512

        91231dc9241927ad8429b2b86453597d6d46225a028f96a4d98ffac946b890e86fc41ff680d9a0374d6c4136c36d1c2e16203360dc8e244d07c2519921d3bfb4

      • C:\Users\Admin\AppData\Local\Temp\PTx6OcwdD\files_\system_info.txt
        Filesize

        1KB

        MD5

        8157eea54200f8e303337be47c8ba957

        SHA1

        581aec4261bb1fc937d840e758b0226c8a60023d

        SHA256

        8350612a8736a3f3d23ed631a77ff4aadc1ac6b9c1520eb88d3756f290bebb3d

        SHA512

        62b5acd1a96d1501b22ce6589671697234e404e70e068c4c9eceda66a95ef4d85bbded4960bc0241a4850b3ad46e732e1ddb6e65e33085ffd362ef1f8880933b

      • C:\Users\Admin\AppData\Local\Temp\PTx6OcwdD\files_\system_info.txt
        Filesize

        3KB

        MD5

        a9a69f59fe2e21305c1d8dd2636f61a6

        SHA1

        13f901d77432b58a9ea67fbcdaa2e84c0a25e7e5

        SHA256

        2d9b5b41811a0f4c7555863c18963e25d13394e45c3864f4550f62b6f318c169

        SHA512

        778d21d161c5b279d7fbc75c5a7b31696c94d3cae94468c669334f4930156b84e333b22b00457b4464c883e5146197f87aca4307c8a1623255f04874a024d3cd

      • C:\Users\Admin\AppData\Local\Temp\PTx6OcwdD\files_\system_info.txt
        Filesize

        5KB

        MD5

        9235c78b58240d412f845dc6b75a4570

        SHA1

        f33910daf56c611d0aa3a0892d6312e069d7fdd1

        SHA256

        574cd943cb312d7e3727fdd525a0333541c483eca6f09ca1a37369c344e92ae6

        SHA512

        d5c762eae518cf307a1b4680d752785abe019344f921fc0a3d78ec8490972d5d8b05531c4b3384a23461026388e7fa3e4c5cfe138111ae110c1142bcc557c4a1

      • C:\Users\Admin\AppData\Local\Temp\Tar249A.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • \Program Files (x86)\Mader\lase\1.exe
        Filesize

        2.2MB

        MD5

        4ae318b79250c2969d663dee668f3a27

        SHA1

        57e5cd1eef257683efc4f82c369739621d8299ce

        SHA256

        753af3a9e8f98e03f71c700d6913933962a3510ffefb97cd57ccbc20991a98a4

        SHA512

        a925d50a05e423533a0aec8f552af0e6f55dd3c116bfbbd6ac49ae6c3dd6acd0641ca3dca70499f22a54860c2374f26c2a807f380475290220f74e53c9bf8aab

      • \Program Files (x86)\Mader\lase\Setup1.exe
        Filesize

        1.9MB

        MD5

        e79cf3b82c9bc3fd37c54b29d5986c15

        SHA1

        a96834689e3454ec7c3bee9872da85ddc900bc0d

        SHA256

        8972be1f2eb134a22c4d46fad916db5b13c5871dc15a7799246542b6de42170f

        SHA512

        1a4786d5b258e7bf450b66bedd6c63e8cd162570965449c87224f21a4c114cc0ac880b907787cce184e9374caef819685ae7dea7d7a43a200866f73e1d11edc7

      • \Users\Admin\AppData\Local\Temp\nsy20BB.tmp\UAC.dll
        Filesize

        14KB

        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • \Users\Admin\AppData\Local\Temp\nsy20BB.tmp\nsExec.dll
        Filesize

        6KB

        MD5

        132e6153717a7f9710dcea4536f364cd

        SHA1

        e39bc82c7602e6dd0797115c2bd12e872a5fb2ab

        SHA256

        d29afce2588d8dd7bb94c00ca91cac0e85b80ffa6b221f5ffcb83a2497228eb2

        SHA512

        9aeb0b3051ce07fb9f03dfee7cea4a5e423425e48cb538173bd2a167817f867a30bd4d27d07875f27ca00031745b24547030b7f146660b049fa717590f1c77e1

      • memory/1644-399-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-372-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-120-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-127-0x0000000000990000-0x0000000000EC0000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-422-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-420-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-134-0x0000000000990000-0x0000000000EC0000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-406-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-353-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-355-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-356-0x0000000000990000-0x0000000000EC0000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-408-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-417-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-415-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-413-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-410-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-397-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-131-0x0000000000990000-0x0000000000EC0000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-402-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1644-404-0x0000000000ED0000-0x0000000001400000-memory.dmp
        Filesize

        5.2MB

      • memory/1652-112-0x0000000003030000-0x0000000003560000-memory.dmp
        Filesize

        5.2MB

      • memory/2504-354-0x0000000000850000-0x0000000000CDE000-memory.dmp
        Filesize

        4.6MB

      • memory/2504-135-0x00000000010D0000-0x000000000155E000-memory.dmp
        Filesize

        4.6MB

      • memory/2504-375-0x0000000000850000-0x0000000000CDE000-memory.dmp
        Filesize

        4.6MB

      • memory/2504-374-0x00000000010D0000-0x000000000155E000-memory.dmp
        Filesize

        4.6MB

      • memory/2504-373-0x0000000000850000-0x0000000000CDE000-memory.dmp
        Filesize

        4.6MB

      • memory/2504-133-0x0000000000850000-0x0000000000CDE000-memory.dmp
        Filesize

        4.6MB

      • memory/2504-132-0x00000000010D0000-0x000000000155E000-memory.dmp
        Filesize

        4.6MB