Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
ac7e35bcbfd470a51f449556aa1fbe9e
-
SHA1
7dd5876685e9ca21f8ff5098242ead93b8423d36
-
SHA256
637b36fdc2cb3c6b930fd6ed725211a6f71d4be69f51d78330d6010305b255ac
-
SHA512
4ed25e226970b4fc12f08a605a7066291929499926c920731c34be476947d987f659f61869daa08c0bf9dfdddcc78f449b2477f4f792eef3ea022e32a2732d53
-
SSDEEP
49152:vmKgSdJRVHOOoZ/25dTtON+3AFKUstkqpZjv8bnNX:eKgSdJnOOoZen40IKUKRANX
Malware Config
Extracted
cryptbot
bibinene03.top
moraass05.top
Signatures
-
CryptBot payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2128-9-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-10-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-119-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-228-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-230-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-231-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-232-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-234-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-235-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-237-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-238-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-240-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-243-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-245-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-247-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-250-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-252-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-254-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-256-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-259-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-261-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot behavioral1/memory/2128-263-0x0000000001200000-0x000000000170B000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Wine ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exepid process 2128 ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exepid process 2128 ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exepid process 2128 ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe 2128 ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac7e35bcbfd470a51f449556aa1fbe9e_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Pmfdz1RciK\G5FyYiQN6OI.zipFilesize
22KB
MD5532971f7c6a60ff6be5df427b70ea771
SHA127b8368a9448ee1fa4eb3f1e739bdd0449a2969f
SHA2563397d305a396b15848210e45e865ee08012eddff5b16cce3266b58d6ef4b13dc
SHA5121d6896244967e9632573f6b44287093cde28e6e8025929cd0ee01580c6ab0cef34bf01c100c64e7abea0f2586b005a250e65c8368471c14f78f41dc2e0642815
-
C:\Users\Admin\AppData\Local\Temp\Pmfdz1RciK\_Files\_Information.txtFilesize
8KB
MD56899c61035fce2498ab6c78e0385224f
SHA1cf9a8263c952122f2968315ac2f8c102bf5b190a
SHA256d1faaeadb87b9c0990c505443d827f8a65d081d33b102a367ae053e7bceda446
SHA51258f4d0d07b56a6d41c2da6e47f0fd014239e9a623c608a5fb91be208ab17b623ea43be8ee5e2581c6cadb89aa4b5ae38252d19a10c24d70f11c371ecd28a2519
-
C:\Users\Admin\AppData\Local\Temp\Pmfdz1RciK\_Files\_Screen_Desktop.jpegFilesize
30KB
MD563d209a8d06f9031c0bb81b2a94768bc
SHA1826e541dbad136c9390b5d69022e657803f16bcc
SHA256ee0eaeb15d9efcd295e2601d8cfc250362ff56691ce2b75fdf336f6617b729f3
SHA512813e3bf1b63eaffaeaa9b216f76492053ccd7608ed7c3d63b3a3cae8cb0ba1896003844efb916c0508b11aada0922aeb2a47584ce8f27400d4d381a03353b800
-
C:\Users\Admin\AppData\Local\Temp\Pmfdz1RciK\files_\system_info.txtFilesize
2KB
MD5363b8461d6b84056161bf795dc4b2a98
SHA1d2fdb60dcd03dae0d92708f5d92fcbd46aadbef8
SHA25613ca7a1233a2ce6dc9f1c772b64ddb512f09a55449eec6024e238ca3e11d117b
SHA512bb1570fabf07ba684b6ad60f580fbd1c4ad44051052b48b1a45cb31fa6f629e70c4ea785b9741250196b72037f52385d9feb554c38d1f26e7013fd9defa9a154
-
C:\Users\Admin\AppData\Local\Temp\Pmfdz1RciK\files_\system_info.txtFilesize
3KB
MD56f21a501f0feba7e6345aa6e7c7f8677
SHA1b4d768dd210b594e15658d67f3c379e7cf20d3b5
SHA25661c311d7d3053ea57e22c8325a48ab36773104fd70891c64616c7d39b73a50d2
SHA5125757f6874cd0045bded24c1c8c9995d2483fd99cf0d6bbaa80061ad565d6dab184c5074a2faba84d02a5f9c8880cfbdeb63b2eee5c1142465c6c43e93561484c
-
C:\Users\Admin\AppData\Local\Temp\Pmfdz1RciK\files_\system_info.txtFilesize
5KB
MD5c5c5ee223afb1a0710fc3cbbc7be5b21
SHA1eac368b177661acfae41d4a8ff01e1f10e82f47a
SHA2568c76f6f74800be11fa061898cd79b3d8812642e912e519b23bd2f4b5b16aeb80
SHA5128dbdbf105369f0c17dc36e00d30900f3c9a4ce1b50d462f952f82796d3757a439ff562e3c7da2818682a48fed46be6057c0abfe123f826df1e386c20f87c1ee1
-
memory/2128-230-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-234-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-8-0x0000000001201000-0x000000000125C000-memory.dmpFilesize
364KB
-
memory/2128-9-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-10-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-119-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-6-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB
-
memory/2128-5-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/2128-2-0x0000000000A90000-0x0000000000A91000-memory.dmpFilesize
4KB
-
memory/2128-4-0x0000000000CD0000-0x0000000000CD1000-memory.dmpFilesize
4KB
-
memory/2128-3-0x0000000000710000-0x0000000000711000-memory.dmpFilesize
4KB
-
memory/2128-228-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-0-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-231-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-232-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-7-0x00000000004D0000-0x00000000004D1000-memory.dmpFilesize
4KB
-
memory/2128-235-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-1-0x0000000077260000-0x0000000077262000-memory.dmpFilesize
8KB
-
memory/2128-237-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-238-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-240-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-243-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-245-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-247-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-250-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-252-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-254-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-256-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-259-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-261-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB
-
memory/2128-263-0x0000000001200000-0x000000000170B000-memory.dmpFilesize
5.0MB