Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Sibuia.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Sibuia.dll
Resource
win10v2004-20240611-en
General
-
Target
b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
b341f1bc5ac611eb57a63709a8cd6528
-
SHA1
85ea543a2bdcb385a7fb45e611ea965174673f2a
-
SHA256
6f5c319abad434df88f93e4068bd85781ccf125546cb6fac3b8d453b347be2f7
-
SHA512
8915bb1501857b8d3367dbbd141d3795eb1cd72b9f7c006c68cdbdd159b910f2f1f3615da5bf6f346e9be8fcc934bff535adf144839a49e4a3bf011aee1d9d2e
-
SSDEEP
98304:8U4tsSgLivtRXrIgDMd6nKhTvUWZsPm05:8paLisgoInqv1sPB
Malware Config
Extracted
cryptbot
bibinene02.top
moraass05.top
Signatures
-
CryptBot payload 20 IoCs
Processes:
resource yara_rule behavioral2/memory/4624-29-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-30-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-138-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-246-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-250-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-251-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-252-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-254-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-256-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-259-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-261-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-264-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-268-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-270-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-273-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-277-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-283-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-285-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-287-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot behavioral2/memory/4624-290-0x0000000000E20000-0x0000000001377000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1.exe -
Executes dropped EXE 1 IoCs
Processes:
1.exepid process 4624 1.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine 1.exe -
Loads dropped DLL 3 IoCs
Processes:
b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exepid process 4980 b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe 4980 b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe 4980 b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
1.exepid process 4624 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1.exepid process 4624 1.exe 4624 1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
1.exepid process 4624 1.exe 4624 1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exedescription pid process target process PID 4980 wrote to memory of 4624 4980 b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe 1.exe PID 4980 wrote to memory of 4624 4980 b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe 1.exe PID 4980 wrote to memory of 4624 4980 b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b341f1bc5ac611eb57a63709a8cd6528_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sib4410.tmp\0\1.exe"C:\Users\Admin\AppData\Local\Temp\sib4410.tmp\0\1.exe" /s2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lPQDbQz6B\_Files\_Information.txtFilesize
7KB
MD570223d10b35d9849ec88a9906fe794d2
SHA115d204611fb3e764e696110b3837c05fd7446437
SHA25670fcd37b0f248a964b0f072cc4196700c7c4937265a3966ac2163af46b7aa7e7
SHA512eaf015591dc0b801a8516cd0af8dd8d201fac5ef5c00f34979413a912f48fc71fe196b85dc7b22339dbd02b232996cdd67996af7c9a6cab082ecbde48e8ed25e
-
C:\Users\Admin\AppData\Local\Temp\lPQDbQz6B\_Files\_Screen_Desktop.jpegFilesize
46KB
MD5acf2dae909f0a45fd19b19a4300506ee
SHA1daf4b00ad28b23ab5b6770bd7066e70873173d07
SHA25632416da675acac70f4620637ac57f1eaef8820b16f8f0f586f9a264516a0af75
SHA512334c30b87658cc8d9a50858ecb12236299932c4b432677845d4fff1dfe1ef6aecdfba721854bf75e1b845e1ac405f3e7f8dd5256b63a97686fe638fcd47288d9
-
C:\Users\Admin\AppData\Local\Temp\lPQDbQz6B\files_\system_info.txtFilesize
1KB
MD5f20f1b5dd44042e8b15dbf801200a042
SHA19d1cdff0cd5a4cf06207fdea9598210f94884354
SHA2560c1f535c69c2f3aa0bc69503240ca29940f8fc52420601c0f78941258b43d640
SHA5126b73e9afff3b139e4c05c3aa6c3b4ab49e5b234a9540fdfc7843a4bbeb166431ff21823fa2edc9c85dfd3eb278273b45f4a9688017191caaed537a9fd95e767e
-
C:\Users\Admin\AppData\Local\Temp\lPQDbQz6B\files_\system_info.txtFilesize
3KB
MD56b3d8672afdd29e1ff9cabb719f8603b
SHA1e473e07e51fe9f1dbd90770818f74f7775053596
SHA25653ca7855472c34ae894fce39ea9cfebf33db7c6f9437d59637caef6c3bd1eba7
SHA512cbacd9c2c7e00ce86314b2ec68c2a661be4ef630e09d5369713e4c475b93d9b3711b579527d4769faa3271fbf5154183bbe7c10c1f735affa24edbf590a24dfb
-
C:\Users\Admin\AppData\Local\Temp\lPQDbQz6B\files_\system_info.txtFilesize
4KB
MD575fd629cce2ba43c8e42bd604cae4350
SHA1728f8dff6f3268cabb4c7668cd1f085453f6f9c5
SHA256b670c22cccc82288a45210027fbaf868aebf020ef3cbf9663e8c604f299af9ae
SHA5129c7bf003531a902c49fb24f0b5f014ddf8e7d2040998d9236b090e1f9cfe793a0d9ebb1b9e69b97852fbabee42ef1f1498ac38d0c84357958fa5c2a29c3e4420
-
C:\Users\Admin\AppData\Local\Temp\lPQDbQz6B\mVLZQZPEQ1khC.zipFilesize
40KB
MD55997b7c25dcb67d76c8ec4d63334c495
SHA1b8be163ca68710d2111cb62cb4305f1091cc7718
SHA256e40bd1f961f6b492a86ec25be733372d4d23bbe26da643185f1c8857c925d773
SHA512d0cc59e39ac0ebe8d36d5ff13584eb538d7ac4e5a409f14fdc268bfeecdcbe2a2b2f5cb0e956744687afeee434b62514c442d214d8a73693f90fa8d538eea7fc
-
C:\Users\Admin\AppData\Local\Temp\lPQDbQz6B\tZAygA38ln.zipFilesize
40KB
MD5dc43a0c166f83d5d625160ea5a618f45
SHA19915bf09403419d7479332fa89e00e6d2ce7ee11
SHA256b37295efc50d4e6d7e596e67007aa4058acb44d0fd48ed0f8785d7b737134d88
SHA5128cb79828578fa186bb1a890234a63c2d178f1f415aa9eca771357f2bdd1083ae1c3708b3cc2d4d1915d61405f324c184f690fcf65188532b40a1f5057327b9d3
-
C:\Users\Admin\AppData\Local\Temp\nso4363.tmp\Sibuia.dllFilesize
524KB
MD56a3c3c97e92a5949f88311e80268bbb5
SHA148c11e3f694b468479bc2c978749d27b5d03faa2
SHA2567938db73242aafbe80915e4ca886d38be9b7e872b93bdae1e8ee6cf4a005b7d9
SHA5126141886a889825ccdfa59a419f7670a34ef240c4f90a83bc17223c415f2fbd983280e98e67485710e449746b5bf3284907537bef6ab698a48954dd4910ddf693
-
C:\Users\Admin\AppData\Local\Temp\sib4410.tmp\0\1.exeFilesize
2.4MB
MD5d55493aeda49935e851a43faa9a3bac6
SHA17be85a17d9d7f0ab3beb1bb105d7a2c644d2f2b0
SHA256658a35ce919defd6baf3811dd40570143d078a7370e09720d99f6fefbf1f2bab
SHA512ac1586cff5ef44e1f8c00fc755c8e0a453c7fa988912bcf05470958f25167987eb47ff814fff07e8a364c1acb75dcdee59b21db0ba3fd485f3fce3816dee1793
-
C:\Users\Admin\AppData\Local\Temp\sib4410.tmp\SibClr.dllFilesize
51KB
MD55ea6d2ffeb1be3fc0571961d0c4c2b5f
SHA1902dfe9ae735c83fb0cb46b3e110bbf2aa80209e
SHA256508336b6a7c3226738e74f6ce969e828da904ad9f7610b9112f883a316ee9222
SHA512e81657087f451a37f06a07bf84175117fdaf75d5d8b84cbdc49497fcf88f96e259074518ea3037680d27c9eaeebd7a8df496297593fead88d7edea202a572585
-
memory/4624-25-0x0000000005740000-0x0000000005741000-memory.dmpFilesize
4KB
-
memory/4624-270-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-26-0x0000000005760000-0x0000000005761000-memory.dmpFilesize
4KB
-
memory/4624-28-0x0000000000E21000-0x0000000000E7C000-memory.dmpFilesize
364KB
-
memory/4624-29-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-30-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-24-0x0000000077524000-0x0000000077526000-memory.dmpFilesize
8KB
-
memory/4624-23-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-138-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-290-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-287-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-285-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-246-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-283-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-277-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-250-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-251-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-252-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-273-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-254-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-256-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-259-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-261-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-264-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-268-0x0000000000E20000-0x0000000001377000-memory.dmpFilesize
5.3MB
-
memory/4624-27-0x0000000005750000-0x0000000005751000-memory.dmpFilesize
4KB
-
memory/4980-14-0x0000000010CB0000-0x0000000010CC2000-memory.dmpFilesize
72KB
-
memory/4980-248-0x0000000073D00000-0x00000000744B0000-memory.dmpFilesize
7.7MB
-
memory/4980-247-0x0000000073D0E000-0x0000000073D0F000-memory.dmpFilesize
4KB
-
memory/4980-15-0x0000000010CD0000-0x0000000010D8A000-memory.dmpFilesize
744KB
-
memory/4980-10-0x0000000073D0E000-0x0000000073D0F000-memory.dmpFilesize
4KB
-
memory/4980-16-0x0000000073D00000-0x00000000744B0000-memory.dmpFilesize
7.7MB
-
memory/4980-19-0x0000000073D00000-0x00000000744B0000-memory.dmpFilesize
7.7MB