Overview
overview
10Static
static
3641665ec1e...18.exe
windows7-x64
10641665ec1e...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
31_1.exe
windows7-x64
101_1.exe
windows10-2004-x64
10file.exe
windows7-x64
9file.exe
windows10-2004-x64
9file.vbs
windows7-x64
8file.vbs
windows10-2004-x64
8Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
1_1.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
1_1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
file.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
file.vbs
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
file.vbs
Resource
win10v2004-20240426-en
General
-
Target
641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
641665ec1ee0c3c0d2bdfe490d94326c
-
SHA1
13c5ab89fdb2e57beff2614659c368b4b67f2ebe
-
SHA256
3cc03de0ddea408c9411f50251d308c51e21f1df7a39d8fba70620696c87eb5b
-
SHA512
b2dab0155d39b918574901a74a00b8e76e2ebac12cf41c762e1792841377489a358881828ed853b85dcbfaf244152efafecaccea8b5dcfdc7b7c5db9fc33e725
-
SSDEEP
98304:5OuIv2eLDrhxayvHhhvC2/IlbehfLCaW47c+UpzXo78UaaWwPfs:5Oum2pyvHHvvIlydLVNoLpzYI0WwM
Malware Config
Extracted
cryptbot
otteppp05.top
doorres02.top
Signatures
-
CryptBot payload 20 IoCs
Processes:
resource yara_rule behavioral2/memory/3972-18-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-19-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-127-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-235-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-237-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-239-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-240-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-242-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-243-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-247-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-250-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-253-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-256-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-258-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-262-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-268-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-271-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-274-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-277-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot behavioral2/memory/3972-279-0x0000000000F70000-0x000000000146E000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
1_1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1_1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1_1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1_1.exe -
Executes dropped EXE 1 IoCs
Processes:
1_1.exepid process 3972 1_1.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1_1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Wine 1_1.exe -
Loads dropped DLL 1 IoCs
Processes:
641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exepid process 116 641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
1_1.exepid process 3972 1_1.exe -
Drops file in Program Files directory 3 IoCs
Processes:
641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Salamanda\bedf\1_1.exe 641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe File created C:\Program Files (x86)\Salamanda\bedf\file.exe 641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe File created C:\Program Files (x86)\Salamanda\bedf\file.vbs 641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1_1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1_1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1_1.exepid process 3972 1_1.exe 3972 1_1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
1_1.exepid process 3972 1_1.exe 3972 1_1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exedescription pid process target process PID 116 wrote to memory of 3972 116 641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe 1_1.exe PID 116 wrote to memory of 3972 116 641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe 1_1.exe PID 116 wrote to memory of 3972 116 641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe 1_1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\641665ec1ee0c3c0d2bdfe490d94326c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Salamanda\bedf\1_1.exe"C:\Program Files (x86)\Salamanda\bedf\1_1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Salamanda\bedf\1_1.exeFilesize
2.1MB
MD55a2a75f58899cde4c6f0db01e76ec957
SHA1687a13b27fc71c0f5b13bbec024a7355d68e9366
SHA2565f542d4b44d1cfad8c47508393fe2695a6165faa0010db45c6a83345e06981d6
SHA5121beed060bf19b93ee6928141e53d8957bb7a06054a38f18f4a03cdd04d8bcff20f6b388c128c04b8ddb337f05730b877b8f44b9b7a1ed4473df6c4e35e229abd
-
C:\Users\Admin\AppData\Local\Temp\nsd4F3A.tmp\UAC.dllFilesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
C:\Users\Admin\AppData\Local\Temp\xbymhrQYGlon\I0kSu835nXDi.zipFilesize
38KB
MD5e14b7d71bd066ed65de644e76a0fc117
SHA1af7c9223b9d0966c7a6d131a44b04d4569914c3d
SHA25670a4213420c2467fa279c8f98b560dd5df99a841c040f302bbb02d120e298896
SHA512d4ef45c6c53c1e373d9bbe00f00459774de3ceae0213b5767b980619fbd30b55c47f75546a0a377cb886fcf8fc306e6c218b4a6e450565e066f426602631fd57
-
C:\Users\Admin\AppData\Local\Temp\xbymhrQYGlon\_Files\_Information.txtFilesize
7KB
MD55bf98467aee8647cf9fd6272b0e3c0f3
SHA157e8bf1ddcf23408ecbea957cff065f26bffbbe8
SHA256bbcea8c0fd5aafc40d21d4052d638bf115a969cfe62256a6fa1fd40bd80875d2
SHA512a4bdf0a1fc30bb852be69142bee9ef6eaf2cf9a5f7a4e9767f22e0f87a46e2f7d806654707cf780ae2ce300ae239bb1c0f46ec645877d7764fbfb022b7d2abe0
-
C:\Users\Admin\AppData\Local\Temp\xbymhrQYGlon\_Files\_Screen_Desktop.jpegFilesize
44KB
MD5d1f808e6e8475b4d6da2e0defaf8a88d
SHA1b9857d4d444ff51057a34bd730d91be98a755aca
SHA256048943b153f165a4054133c146d04063647a337b9f8b8e0bff6d6e10c8145a5b
SHA512087f96e459a049c9184e0c378cbce8f06367463775fa37b1432cca7aff8117d1657af6a18999f06679cabbb95e77e2fd8038ba61f236f6cd6cb8a7ef9984de8a
-
C:\Users\Admin\AppData\Local\Temp\xbymhrQYGlon\files_\system_info.txtFilesize
1KB
MD5ebe40d074f7fcfd89f5f99521ea22fe4
SHA1304d0d8488e48b070dd0615360c176490103a25a
SHA2563c5df80a12e0fa09d2803e874adb8c1286ff83f385c4222d3cfbe3fb9856974a
SHA512bdc5a9c5471a50d8bc5046054dc17e0c12158cb7f2d5e86bb93c3a0be82e4dc795c9d52f8e3d8f0963e3cea4b1ff30a08c10a67f8deea6d6ee87bccfdb0a3ebd
-
C:\Users\Admin\AppData\Local\Temp\xbymhrQYGlon\files_\system_info.txtFilesize
2KB
MD53404c174234a2509491dd4fe5e19bed2
SHA14e83a3d3dfa9b743a625b559b7d72b705cd46f10
SHA2562041c123e3710315ee92f05ecbf3f77060ffe1c0185bd89091364548f55d4c76
SHA512ff2095fa556903cf25e9f28fb2f74eb5355a388df6f210cbf2d03a78c91da96a026c6726845b96e7ac39ac2114857ed382fd830296a7009ac140c8d597623dff
-
C:\Users\Admin\AppData\Local\Temp\xbymhrQYGlon\files_\system_info.txtFilesize
4KB
MD577c84f553a85a69688c5b0ac3d9f9388
SHA1790897741cfb3979e889f7c5db3ef52358145bad
SHA25617606769aad38e35a3760e0cb258f3249b3b31468252abe32522b8c0e40e46f7
SHA512d61eb6287d22318d12d70fa199595c063fe6d0f20570f7df7f83b760dac2b732e8b5dbb53d855a172a922352964dc066ee74bc746185c73852ce3907fddbe1c6
-
C:\Users\Admin\AppData\Local\Temp\xbymhrQYGlon\rMmjowVXub.zipFilesize
38KB
MD56f7dac7a14dfe0bb3e75840fc2750282
SHA120ba78ef14b6f28e6fec02b52c389a7bd3f40959
SHA256fa7e2ad0052764b90bc2fa91dd57704c4075985b25a91ad6f0566b6eb075551c
SHA512cd494a82b0e8cab41e5ee515a02e2280e2d2cc6988145071cd451b0490e1b4fc6009cb4538d702293cdef575a04cda9340669c55613ebcc87a4692b324c43a08
-
memory/3972-237-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-242-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-127-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-13-0x00000000053E0000-0x00000000053E1000-memory.dmpFilesize
4KB
-
memory/3972-14-0x00000000053F0000-0x00000000053F1000-memory.dmpFilesize
4KB
-
memory/3972-18-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-15-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/3972-16-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/3972-235-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-17-0x0000000000F71000-0x0000000000FCC000-memory.dmpFilesize
364KB
-
memory/3972-12-0x00000000773A4000-0x00000000773A6000-memory.dmpFilesize
8KB
-
memory/3972-239-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-240-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-19-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-243-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-247-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-250-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-253-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-256-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-258-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-262-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-268-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-271-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-11-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-274-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-277-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB
-
memory/3972-279-0x0000000000F70000-0x000000000146E000-memory.dmpFilesize
5.0MB