Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
498a7e8e52d0ff1d46fa1d637ea4b936
-
SHA1
87d4e01725044b284712911718dc45556eb68eab
-
SHA256
b7da21f054890cf9ae78bfbe8b8ca38f295d6eb4d1544e2e0ea891a87d8b150a
-
SHA512
2052e370bc56b284e53cfcd79dcff5cbeb420c561c2e0549dde2133d2a7a9adb54b8b0c9bfc4a00683e1057e6a1afe693cfe63550200181e0074295c6cffab14
-
SSDEEP
49152:hFGdMIU3Ww7VmaoR/rzPgi8GTNkpI1UCLjUkU6:VIU3h7VlcveGCoUCLNU
Malware Config
Extracted
cryptbot
bibinene03.top
moraass05.top
Signatures
-
CryptBot payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/920-6-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-7-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-82-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-228-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-230-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-232-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-234-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-236-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-239-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-242-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-246-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-249-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-252-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-255-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-257-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-263-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-267-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-269-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot behavioral2/memory/920-272-0x0000000000C20000-0x0000000001123000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exepid process 920 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exepid process 920 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe 920 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exepid process 920 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe 920 498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\498a7e8e52d0ff1d46fa1d637ea4b936_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\YizkxK021t\_Files\_Files\DisconnectResolve.txtFilesize
211KB
MD5a1a8bcec5d4d03ae98a092547a227e42
SHA1ce7d9144290d66487d97e835974473f7adc16c3d
SHA256d2d3aef4fdb44221b2a7aa7dab2e9a2821f1d0997f8394aca162e971f47fa185
SHA51244ac6fc364bdcbe66655d74bdb3df15ec97da0c9371165f2c4f662e2f23d6955a8926468e0d6f330a37a23ba9f75aa2b1d89f604f06ff2313bbd0a2c4998af70
-
C:\Users\Admin\AppData\Local\Temp\YizkxK021t\_Files\_Information.txtFilesize
5KB
MD5e9cc17ab6ddaea059b9fd2e6e621ecb2
SHA12d6b8ccfd115f0d4ddb67a3b1a28f68ee870eb21
SHA256b9b34efd167b2de9a8a204b67309e5701b43274092c53656203dc96bd68f93ed
SHA5126718bf8c7cbd2a824a8540a3ed94ec7eb897b92fb2038774973f2cb1ef82ba2d45ba0b5604d3a45f7760eebbfe26510a847401c69863fb21f9a8a63a5f9bc7b3
-
C:\Users\Admin\AppData\Local\Temp\YizkxK021t\_Files\_Screen_Desktop.jpegFilesize
49KB
MD5fb45efb04346950cc2967bf2029037c1
SHA1702612c3b2bea35c57e1217c0cc30ad02e41c814
SHA2568e80ad90a92702dd53e3e4b8b4ea33b5f60f9ce6295f70933926975d9be84ada
SHA51209bbbc932ca304c10762ce716db7f05c13d5770cd321dccb9a94b38a4bb11e1635b33ac8e4ea5957af8e205b138384ed465d8da044a77f9131164045dd593911
-
C:\Users\Admin\AppData\Local\Temp\YizkxK021t\files_\system_info.txtFilesize
1KB
MD5cf7ac40afde00cecdf97e373c357e572
SHA174668251a923884f20df870e684d28778db57b5d
SHA256f2691a2ea2aeaf17fe4e683d43fe0a31078fa462773888edd97597b526a93cbc
SHA5125c572a0a3a7be82a46c96392aea2a35ccb5e4153c3d6dfbe699521e969c357372129c2c3bff9d00cbfc1bd349f3c8f2ce31ed920f3aba570b8cb8e77d6c6d245
-
C:\Users\Admin\AppData\Local\Temp\YizkxK021t\files_\system_info.txtFilesize
7KB
MD5db25c571586330b24a33ac53a9bbeb24
SHA1a1fa13f6775f8c2a3ff84a042400be63ec8c9c41
SHA256dfa979fc251486c1fdfe87de1390014a65dc657f29242ef740bfff2eeed8462b
SHA5128abcaa9a81a3eb0e908928fdfb7ad35749ed7e6760c515d3188ca4740c66c37e736aea03f9ea2c9c14a45b45d16634eab1217f8865d77789bf9370a011c78924
-
C:\Users\Admin\AppData\Local\Temp\YizkxK021t\ljh0g6xommEsh.zipFilesize
255KB
MD5056c543e55a79f98c71a294cd345eec2
SHA1fbc8025b4cb902f5cac43943fea4c1103fd430e2
SHA25663d34e55bcc67d77469018f5e106fefbac77c0c1f679d8a86cd53fee8cb1331a
SHA5121ec50dd8794ce2a8389b20249feeb10a40f0016a250aef4383bfeac9e3a329cccab32bb5138f7a0129befcf32720afa81913c127427bd2b16caf6eea3a169c7a
-
C:\Users\Admin\AppData\Local\Temp\YizkxK021t\xlhdpoVjdUAmx.zipFilesize
255KB
MD5bed82b124391ff445e1a5e9bb667961a
SHA157adb2172082b961680e306626ae21cb73cb5de5
SHA25607a93e6dbd2e08032325401cd16f491892ed2ed72e293268db5a162822baf689
SHA512770d6b6176d7de93a0ae12f963592cf187c7e2a4615fc127243a5e6ad8f591b3dc92f693246ed0268df14bb7f237ae7e1b4b30e178c4f32f5e4fba10ac13e547
-
memory/920-234-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-2-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/920-236-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-4-0x0000000005620000-0x0000000005621000-memory.dmpFilesize
4KB
-
memory/920-239-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-3-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/920-1-0x0000000077154000-0x0000000077156000-memory.dmpFilesize
8KB
-
memory/920-242-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-230-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-0-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-232-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-6-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-82-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-5-0x0000000000C21000-0x0000000000C7C000-memory.dmpFilesize
364KB
-
memory/920-228-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-246-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-249-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-252-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-255-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-257-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-263-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-7-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-267-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-269-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB
-
memory/920-272-0x0000000000C20000-0x0000000001123000-memory.dmpFilesize
5.0MB