Overview
overview
10Static
static
3a0c00db1c9...18.exe
windows7-x64
10a0c00db1c9...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10SetupX.exe
windows7-x64
9SetupX.exe
windows10-2004-x64
9Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
SetupX.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
SetupX.exe
Resource
win10v2004-20240508-en
General
-
Target
a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe
-
Size
4.1MB
-
MD5
a0c00db1c96524b17161060ecbbe6a87
-
SHA1
3eaa22467cf0f6a741d5e262c4b416db8c0a1f4b
-
SHA256
450624cfacc4237336833fd0d3e9eb928508224d5f1adf3b907fd3d5016526a6
-
SHA512
cedd14061d0d4c1035448d386f327478cfcf6bf3eb3c2c4589580e1e6ce30448f291658e50e44a5eb108caca515980e63525c008172951f7127111418374192a
-
SSDEEP
98304:7u6PnzjAOpAQiESlgpoWuhiB8k3rPGq8nfklad3O3+2tAcX36/p3a:77zjcllDi8qaPfklaQuFK
Malware Config
Extracted
cryptbot
hbv01.info
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Setup.exeSetupX.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SetupX.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exeSetupX.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SetupX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SetupX.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup.exeSetupX.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation SetupX.exe -
Executes dropped EXE 2 IoCs
Processes:
Setup.exeSetupX.exepid process 832 Setup.exe 1080 SetupX.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
Setup.exeSetupX.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Wine Setup.exe Key opened \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Wine SetupX.exe -
Loads dropped DLL 1 IoCs
Processes:
a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exepid process 3696 a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 18 iplogger.org 19 iplogger.org 23 bitbucket.org 24 bitbucket.org 50 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Setup.exeSetupX.exepid process 832 Setup.exe 1080 SetupX.exe -
Drops file in Program Files directory 3 IoCs
Processes:
a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Xedd\Setup.exe a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe File created C:\Program Files (x86)\Xedd\SetupX.exe a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe File created C:\Program Files (x86)\Xedd\DiscoveryTree.xml a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4748 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exeSetupX.exepid process 832 Setup.exe 832 Setup.exe 1080 SetupX.exe 1080 SetupX.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
Setup.exepid process 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe 832 Setup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exeSetup.execmd.exedescription pid process target process PID 3696 wrote to memory of 832 3696 a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe Setup.exe PID 3696 wrote to memory of 832 3696 a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe Setup.exe PID 3696 wrote to memory of 832 3696 a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe Setup.exe PID 3696 wrote to memory of 1080 3696 a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe SetupX.exe PID 3696 wrote to memory of 1080 3696 a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe SetupX.exe PID 3696 wrote to memory of 1080 3696 a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe SetupX.exe PID 832 wrote to memory of 4884 832 Setup.exe cmd.exe PID 832 wrote to memory of 4884 832 Setup.exe cmd.exe PID 832 wrote to memory of 4884 832 Setup.exe cmd.exe PID 4884 wrote to memory of 4748 4884 cmd.exe timeout.exe PID 4884 wrote to memory of 4748 4884 cmd.exe timeout.exe PID 4884 wrote to memory of 4748 4884 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0c00db1c96524b17161060ecbbe6a87_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Xedd\Setup.exe"C:\Program Files (x86)\Xedd\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\BbZJgLHkhs2vK1A & timeout 2 & del /f /q "C:\Program Files (x86)\Xedd\Setup.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\Xedd\SetupX.exe"C:\Program Files (x86)\Xedd\SetupX.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Xedd\Setup.exeFilesize
2.1MB
MD5adf27669e814f5a7a6dfa36ade88c9ae
SHA1b8dbb43c2070cf04ae6b2d62dc010564fbf3599e
SHA256dd5ae3cc6b45057a744d2fa1f7f42b03980b7aa90154b2eebdb8b4ad5a02babc
SHA5125cad0447d1c748424c66fb3bf7a7cf04a7ecae090cb68848f73eeff903ebf83b4431fba474f04752bef2ace9398bb538fae53ec14c3f8aeaa8c65d759f02dd95
-
C:\Program Files (x86)\Xedd\SetupX.exeFilesize
2.0MB
MD5d5f103b258b8d98e4398b82b9972deb5
SHA11a43a240d0b4fdc6baf88e7d1104519737b488e8
SHA256cd19ece38b82e73c78da4b7ff39bb8518f50148adc00e8ba94ffb119e4ee6fe0
SHA512c764aafbbcb7b6d78b937da0fbf266f9747c0242232326194812d480320dc47ebd52a2aed417a7257569cd9e2159693df00d6249226814f98e8acc59fd728351
-
C:\ProgramData\BbZJgLHkhs2vK1A\47283761.txtFilesize
156B
MD5c12be1e7b6541de7746a7e6f7c722027
SHA1c637002a9c8aa73dc4dbccc2908aef8ea15819cc
SHA2560f974cdba262cc57a0a57aac5fc2ab5516ff2dd953247cf817690425dca401fd
SHA512f7472f853b360639007a307ab6db31ba4287c117bbacc2c0081904e47afdca6f4c236dab438bb387740166cc5bacc184a0752b69d0d7cea92315bac9b5dbd5c5
-
C:\ProgramData\BbZJgLHkhs2vK1A\Files\_Info.txtFilesize
764B
MD54f2299090c927b0488df389eccd008e1
SHA15cf7bfc18b8b2485fa4825043232c0b8477595d5
SHA256f9d6fa401235aa4736ac30086441c127bd8cfd900af3192edbe44cf4f9f43c64
SHA51200dcfda429d3b6a6664abdc8137ac3c98050af1584daf69e99d8aa0fc32682787db5a377dfd1c6dcea1d2aeb8588ce721d059fa25a844f61318ea3fd4f207ed7
-
C:\ProgramData\BbZJgLHkhs2vK1A\Files\_Info.txtFilesize
8KB
MD5ad9459d9c83ba46d1450b5fa94c871e7
SHA1c4d61765425d941aa9b63df1caf0738e54ea7e8c
SHA2564720b175244d7222faa5cbe6a173dc5509ef06566ab8a8265c2cfd70a2405db7
SHA512a2ce90266deeafaeefaec658dfa0b733d248deb597dab34bb6fd51018e2beb14606e634d54748f1c58b72967921fb3b283c1c7794bb2c81b836bfaef762bc218
-
C:\ProgramData\BbZJgLHkhs2vK1A\Files\_Screen.jpgFilesize
54KB
MD5899ae83334829851ec5619c203695875
SHA1170fcebfe4a05c474c7cce9b4e6b3a67814cb78f
SHA2567252f282362059af6e4c904b1c80223685ef33b7f56f9d263feaa15b6ec51569
SHA512f0a50fd47c7a5580f0d0ea4ae1dbb97a426c28a7686aed5839e6b35ee388e099bd9a30897ad5d37f9d864e817f30bbb506beefda9eb03768541c721378a000c8
-
C:\ProgramData\BbZJgLHkhs2vK1A\MOZ_CO~1.DBFilesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
C:\ProgramData\BbZJgLHkhs2vK1A\umpCPHYbg.zipFilesize
49KB
MD55210b6b9261e0ceee5e455d87586f3dd
SHA14592173b189b6baceacc733ded108266cb330f21
SHA2564ae407f18606585445e0e32375b3bcf273614e388f1157c709de221e67aae784
SHA5128d183e5c8e33732b191b858f441a2ec301538e8a0ad0e0ccd8433d905ae02365ef54590649eabeba99418adb796279806cd65bf57380a2edc9e022784b73b96d
-
C:\Users\Admin\AppData\Local\Temp\nsl3096.tmp\UAC.dllFilesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
C:\Users\Admin\AppData\Roaming\erdvecwrv.exeFilesize
13KB
MD51bee5fdc11bf9e09da5ec40c554e6912
SHA1c528b89f18ede4d1562bfa6d71d8fc0e5401a4cb
SHA2569660c0646b021407a5386bb225a9dc00f5f51d9f600242fb6d99aef6671011e5
SHA5120cc7915b7fb58ebb33b68c7da64590f1a709cfceef90babeea41dc6c9e54a6333044b61e3681182614c56257bcbd2c3bc94a75820395bc43f634d684b2bd856d
-
C:\Users\Admin\AppData\Roaming\ervdetbrvyb.exeFilesize
13KB
MD53c629506c1c9166f1c60199e47015c68
SHA13b5fae35853981f8b506a5598413ccface5d3097
SHA25607d2fe24f6726ac987f3e8af3b221021ae25c6150df12496c1320ab1b034e587
SHA51293fc8e8dab92641f0ceec04c9fa085c2147ec0b07b74b127bb3b3b59d9883d95367333bca90effdc83e2bdf35dc05a70fb16157b40703a32d4b3eb08a45058ab
-
memory/832-225-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-233-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-15-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-263-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-17-0x0000000077354000-0x0000000077356000-memory.dmpFilesize
8KB
-
memory/832-39-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/832-249-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-32-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-18-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/832-19-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/832-167-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-168-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/832-246-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-175-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-242-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-177-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-179-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-181-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-237-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-33-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-20-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/832-185-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-229-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-23-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-192-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-21-0x00000000005A1000-0x0000000000600000-memory.dmpFilesize
380KB
-
memory/832-211-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-207-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-200-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/832-203-0x00000000005A0000-0x0000000000AD5000-memory.dmpFilesize
5.2MB
-
memory/1080-234-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-195-0x0000000009E10000-0x0000000009E11000-memory.dmpFilesize
4KB
-
memory/1080-201-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-208-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-182-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-212-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-193-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-238-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-226-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-187-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-230-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-183-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-196-0x0000000009E30000-0x0000000009E31000-memory.dmpFilesize
4KB
-
memory/1080-204-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-186-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-178-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-243-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-174-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-247-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-50-0x0000000009FF0000-0x0000000009FF2000-memory.dmpFilesize
8KB
-
memory/1080-250-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-35-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-36-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-16-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB
-
memory/1080-34-0x0000000000400000-0x0000000000913000-memory.dmpFilesize
5.1MB