Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
91a8df2a703c7a45dd810b8ac711b3f1
-
SHA1
584704b833ff492ee99ed1cb9a13365a0993a539
-
SHA256
12dd0096f6d94a29abc4f8da7203dfef2b3f8ce5a0fb4c959fe53caa3b26d4a3
-
SHA512
d0d20c6896d602801d6cd5e6f779c43db6d5c620a90a87c208f2aa5a5e0b1e119235ba6c919a16069251828fb91af9dcaac7002e1bff80fca70c4cf28ee8762e
-
SSDEEP
49152:2/t+m+UUUUUUJUUUUUUQ9XpiNfwG0chfhp838YbgBs0qm56TZylx+ZJMV:W+mJUUUUUJUUUUUUZVHhp83xEu6x+/
Malware Config
Extracted
cryptbot
nkoopw01.top
moraass06.top
Signatures
-
CryptBot payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1804-9-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-10-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-119-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-228-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-230-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-232-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-233-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-234-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-235-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-237-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-238-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-241-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-243-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-245-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-247-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-250-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-252-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-254-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-257-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-259-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-261-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot behavioral1/memory/1804-263-0x0000000000150000-0x0000000000640000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exepid process 1804 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exepid process 1804 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exepid process 1804 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe 1804 91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91a8df2a703c7a45dd810b8ac711b3f1_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\JgnJZVO\6u40AdqZ38me.zipFilesize
37KB
MD5416d746565d077f1ffef7486e1654d1f
SHA11f490301a7f0bc1ce15b68495f267a33c88e5707
SHA2567a1195f10f70ee4cbcaeedd02df4a82b2f36284947ba55d920aa2a2429df8d2a
SHA512735f747895ea658c9babb51ce1dd25c360a16bbb3b25c81e5e708ea61168bbb17d46db3acba2ef2b76a22ad7e0721953386597f89569c991fbc3c7e69eafb30e
-
C:\Users\Admin\AppData\Local\Temp\JgnJZVO\_Files\_Information.txtFilesize
8KB
MD5f4217798f5e39c3162d2174edd00850b
SHA121f7aec5a500d2db465906837b01fa5d04253f05
SHA256ed9048df26edfc753035ceb1bd4925700b7e30dc7dafb56ed485878bdd294a3d
SHA51252fc638e64afea03e6ab83438576494366df231871023d8eac9f51d74ffc749c07e47c7072c61ba85bbf64d7f90be4be2e866e49775ebd2911efee5fd5e9b85e
-
C:\Users\Admin\AppData\Local\Temp\JgnJZVO\_Files\_Screen_Desktop.jpegFilesize
45KB
MD5291fd54df4896ce88a9f944361817291
SHA1c17b8259631b6314a430318116a8508c330ecc02
SHA2562189c2e2d6405d4dbf76bb988543e08da09bdf86e334ce196051a03432533f8b
SHA512c5317f22c820845345e15add64f0562f89a56b51a2ff39bcd3e87494edec717ce1425dcfae5da64d1390c6a93d89d9382c3e0b6b534c8256b3e120684f0968b5
-
C:\Users\Admin\AppData\Local\Temp\JgnJZVO\files_\system_info.txtFilesize
1KB
MD598df4d720fe99bb8afd38cd2499d100b
SHA181dfa7b6a77b8d9ece165590878092a16ec3f6dd
SHA25674e4d2ec43e19f68eecf0708ff85feff04fc0cf117607011facdff1ad28cd02c
SHA512af932d0b7e80a2be2f056acc956cb74b43c2a91e6470f4877381c2a773f33cc83a30b33f60ac6a9848855e41b18fb34ff1a80f82199fa86fc079d23bf45858cc
-
C:\Users\Admin\AppData\Local\Temp\JgnJZVO\files_\system_info.txtFilesize
3KB
MD5ded0cd1f97ec5ce01b9173eec31025b7
SHA1097ce438b8023e32126f7940af33f09c495148a5
SHA256b04bcd7e33e0127a9379b1dfdb6eca8545ad4ce8b7d26ba8189c1b4490fff852
SHA512039996becf3c337fd52a9472dec47af4c59a50cae85057a7a0ee7eea1db676d323f5457e99deac458aeb5fc0fd4b5aea547843f4b9410c60cc75fb7f773adac4
-
C:\Users\Admin\AppData\Local\Temp\JgnJZVO\files_\system_info.txtFilesize
5KB
MD50a0ac06b940cb0508c1840e26e1a4f54
SHA1630be237dd39e971e8ee4431fd84b5fa165ae3c8
SHA2567c182a3f44ffb165f2414c52cfc16155671858954d2be2c989d85c9607e25452
SHA512a0a4b0def82ae71bbdba49cea2fcb3806e45abcd2afae7ae2e57ad3681e3972c7ed963dbd7218dbe9a9f1b9c3194197268c3d3a92737c7a9d7a64883bf8f3ed6
-
memory/1804-230-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-234-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-8-0x0000000000151000-0x00000000001AC000-memory.dmpFilesize
364KB
-
memory/1804-9-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-10-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-119-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-3-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/1804-4-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB
-
memory/1804-5-0x0000000002410000-0x0000000002411000-memory.dmpFilesize
4KB
-
memory/1804-6-0x0000000000AC0000-0x0000000000AC1000-memory.dmpFilesize
4KB
-
memory/1804-7-0x00000000007D0000-0x00000000007D1000-memory.dmpFilesize
4KB
-
memory/1804-228-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-0-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-232-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-233-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-2-0x0000000000A10000-0x0000000000A11000-memory.dmpFilesize
4KB
-
memory/1804-235-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-1-0x00000000776C0000-0x00000000776C2000-memory.dmpFilesize
8KB
-
memory/1804-237-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-238-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-241-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-243-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-245-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-247-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-250-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-252-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-254-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-257-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-259-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-261-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB
-
memory/1804-263-0x0000000000150000-0x0000000000640000-memory.dmpFilesize
4.9MB