Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 07:21
Static task
static1
Behavioral task
behavioral1
Sample
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
7feaba431a42a40cb1e8587456b904db
-
SHA1
d8b91ad566fd2779895d188c8b9b8f2d48e898f1
-
SHA256
687b6bd075c80985f5e38c24da153e1aeaf53afa2643eb5d0d00c936f6591c85
-
SHA512
abff85eeb883c6cd5a038294c019fa3961751d55090cc59f076bfc6946f73713842da5f62bc951f199a6275cf9ed9a3a0eff564b60db47f91a56693bf32d9279
-
SSDEEP
49152:qIOygdzOYVih2MT3YeWRSFzN6Yr0yCSZL:qI2zTMoPeN3Cq
Malware Config
Extracted
cryptbot
bibinene03.top
moraass05.top
Signatures
-
CryptBot payload 20 IoCs
Processes:
resource yara_rule behavioral2/memory/3476-7-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-8-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-116-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-224-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-226-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-228-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-229-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-231-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-233-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-236-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-238-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-241-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-244-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-247-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-249-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-252-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-254-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-260-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-262-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot behavioral2/memory/3476-265-0x0000000000A40000-0x0000000000F55000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exepid process 3476 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exepid process 3476 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe 3476 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exepid process 3476 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe 3476 7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7feaba431a42a40cb1e8587456b904db_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AxIDSrrh\AVabaS8GMXuK.zipFilesize
43KB
MD560a2f3ef4aa0a610018edfc1d3690fed
SHA1e0ca9fe8e48a4cf131ec5ef1c8fb2637d9c4dca7
SHA2560a8e45f7e0522ca289b03652f27e46132f4e1531e8f9fcec2347a237af4bb818
SHA51226e9eab350e28219b66d99378803c2f84508b902e1398526012fdd2b604a0c3a34ada1d10c3e6c9e42d2b7afc44cf0365fd97bbe4cf24d84724f089c37dc07b5
-
C:\Users\Admin\AppData\Local\Temp\AxIDSrrh\_Files\_Information.txtFilesize
7KB
MD5682865b33b7cb17c11af448c83e80618
SHA1dd17e1f147b523d795088e044eadd1182f44d422
SHA256738f715b6e3252d29ca8bae3af639379cac6b91d216eab137cd8c69071c0b6e6
SHA512676205e3dffff553f4cf86fd770d6b3d20d3b25e7ce8d9a1370b11a8ddc8192912de4288cffc743f9f77c792fcaa6c16fb5defde7c39676b2c320933d90e8ab2
-
C:\Users\Admin\AppData\Local\Temp\AxIDSrrh\_Files\_Screen_Desktop.jpegFilesize
49KB
MD5d3734f7a7265431684610a48c1d53e0d
SHA188b39deab6eabfe9500fa2e73681c0b1b25e4420
SHA2569cd8de46d0bb17841fdbec6ae754feba75367e614b0616e3bb9f70f5b55346cd
SHA5126d7da7f2663a271fedd91fd934125cfa5520f79aa66f9450d7e639af68138c8caccef496a0c542449ca7d194aa6e4c2bdaa10fab48809ae374760afb76fed964
-
C:\Users\Admin\AppData\Local\Temp\AxIDSrrh\dYgLi5nq6E.zipFilesize
43KB
MD5b3f89734da6b2c7ce6672b2598548b0f
SHA1afee3340def46b31b887b0709509b14d4d6d2169
SHA256a36f2db2813324497efa1d6352fed1243f2ab9c1db065be4bbf34ea46e101e98
SHA512cee14d6f72ea1dfa6dc033301dde80643cc2581cb12f7e62fb7ffcbfe73d4fa7f1e4de442dc93447a97eaf92b65e121540e806f18188614db5a024380eba7b75
-
C:\Users\Admin\AppData\Local\Temp\AxIDSrrh\files_\system_info.txtFilesize
1KB
MD5c4db2c1fb64b75c2eb2b41b8dc9f995f
SHA1f5c20c08166f2e624b358e83be4c2c77d5d1e4a7
SHA25648e7cc0052ec20c38fd6707b1b90db235ff0b9d0f8e89a1e54739d0cab9338ab
SHA5124000373bd676bf68e67e91c8859fd64b53554ff93fa750fe3de265311ef223d039d21fd9d11174352820f9e9fc9287248b04cca7130e596b207d4d40c46b804c
-
C:\Users\Admin\AppData\Local\Temp\AxIDSrrh\files_\system_info.txtFilesize
7KB
MD52958407f92968583409b1dd1a1e4f2a8
SHA195b3c6d36211daedb082479732b39a4854461ada
SHA2561e278d96e9befc7231a56c9430f1749c6dc0396a4fccf71f634baac7950a0a38
SHA5124a6ec7a48c8c30cd1d09b3516481f9f75761536b042cf3d51043407f25e8b42a78d0ba8238ca292690f2e56075f1c06ae9c67945bfed1aa2229dbacbcfbf7b35
-
memory/3476-8-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-231-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-0-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-6-0x0000000000A41000-0x0000000000A9C000-memory.dmpFilesize
364KB
-
memory/3476-4-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/3476-116-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-5-0x0000000004C40000-0x0000000004C41000-memory.dmpFilesize
4KB
-
memory/3476-2-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/3476-224-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-226-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-3-0x0000000004C30000-0x0000000004C31000-memory.dmpFilesize
4KB
-
memory/3476-228-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-229-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-7-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-233-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-236-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-238-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-241-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-244-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-247-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-249-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-252-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-254-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-260-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-262-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB
-
memory/3476-1-0x0000000077594000-0x0000000077596000-memory.dmpFilesize
8KB
-
memory/3476-265-0x0000000000A40000-0x0000000000F55000-memory.dmpFilesize
5.1MB