Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 01:06

General

  • Target

    e8dc2f1287e54db1661563f05ebd1535_JaffaCakes118.exe

  • Size

    4.4MB

  • MD5

    e8dc2f1287e54db1661563f05ebd1535

  • SHA1

    14d2a586dab1c48197d3298f648d82d507ebe28a

  • SHA256

    57fd9194f07f05c74a6cc39978fbcc9e68eac67779d047de5df8afa19e567064

  • SHA512

    c59d33501a5f65066a22d38a3133a530e17d765c32b1487eaba605b275d480b72a870b80ef1ac2a83a8fca71a70a6ae549497f9e796034a4e26947ade6417693

  • SSDEEP

    98304:5v/TdEIfWt/9rGvP3Ia5BTT+mky9RK7NIOCttTYZ9:5DdEH1rGvPpBGu944Q9

Malware Config

Extracted

Family

cryptbot

C2

otteppp11.top

doorres03.top

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 16 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8dc2f1287e54db1661563f05ebd1535_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8dc2f1287e54db1661563f05ebd1535_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\bhlkvsjpne.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bhlkvsjpne.vbs"
        3⤵
        • Blocklisted process makes network request
        • Modifies system certificate store
        PID:2676
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\epqntpjwxn.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\epqntpjwxn.exe
        "C:\Users\Admin\AppData\Local\Temp\epqntpjwxn.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:1820
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\vmwnvcpa.exe"
      2⤵
        PID:1536
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\gjkfoattxll.exe"
        2⤵
          PID:1036

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Virtualization/Sandbox Evasion

      2
      T1497

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Discovery

      Query Registry

      5
      T1012

      Virtualization/Sandbox Evasion

      2
      T1497

      System Information Discovery

      3
      T1082

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        9592fc7f10e6011bd47b63c38b4e2741

        SHA1

        646cd30e53054683c728b712fcb6738045979e83

        SHA256

        acd84eef8ff86d1a2c6f290b9689fbb5445588dcd81d569007bcbe78b48b6b15

        SHA512

        63e7034103051995d757fdc8fa82f0c1463eb0854a58be5ce7816dd33561988df7f567da0396f1cb4a134c1d1f79ba1e21010be6260b4ddc6a799ad881199dca

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        ba8a7e659e3d585c88f7cfb73bc9b8b2

        SHA1

        2d1906bb2d1f8fa1e4f809325b48f982114d9d98

        SHA256

        c329898650e28c4db68799d67e29d685cc6b1529eda7e47c894883f72fbca5aa

        SHA512

        19d7cbd23ce2daf80042dd1de444b9665f2b11ddf9bc69fc86f22170d1962cd3aa458259e2f8c4d918e75f3f69d9bbeee75a2a5181da8e77ebedd876a4a9774c

      • C:\Users\Admin\AppData\Local\Temp\Cab1CA7.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\_Files\_Information.txt
        Filesize

        8KB

        MD5

        1d7fce754b29e1f833270a0c4b72c73a

        SHA1

        2bc74a43a0c3efb4ce942390435b0d6c4f601a53

        SHA256

        b11f9453437e39583b3c3f726c9cf36c130fc53ee2f6b31d677d322df0780422

        SHA512

        c6d9277cab1be845a9f7db01bbf293c15b536366d8fd2f89578872d8995bdb4d628bc8cfd7c9f514fda79c18c38a56c6cee189755b3b0ecf66f4b9884dd89262

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\_Files\_Screen_Desktop.jpeg
        Filesize

        41KB

        MD5

        1808bca4f34300b18ed5c7b975cdfef6

        SHA1

        88784b3f662943a9917d6bb86daf5f08d95e992c

        SHA256

        b5fcdef7175255f5fbb40cc291364efed83f2a8995d600cd72a3cad10220d8e3

        SHA512

        2e330839eed988ab8d195af713c22af9a086519946c0d204a0c5d48999633b681ef3368c21550b8f1bed5e42c259a6c34c160d70024a55aded1ec8f05671a3ad

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\files_\system_info.txt
        Filesize

        1KB

        MD5

        01a37905ca4988c60face19046af1c8f

        SHA1

        06ff400b5bc303cbcde0d0863f752c96fc5b2c50

        SHA256

        65e3344789534687963da3c21b38e1d6d541a7c90c60a9efc0957bb8af8044b7

        SHA512

        a5be7031a3ef94c4a37d84b8ae11e8840c900158be53b7a77e4e7fb185914ee5d6a31cfd4f52dbc198d96bf078c5a09d72623ae08bab87adaa41beccc8439b8d

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\files_\system_info.txt
        Filesize

        3KB

        MD5

        06beca1e6ade6253fce9749e9975376c

        SHA1

        54cb90ba076c3c7b1ba4fe8938d1a0495e137928

        SHA256

        b38014290c3135ea641f447cc7f05c0bd080ed393cd527a1a8e009f82a68c544

        SHA512

        71cfddf4bbf1865a298410e4a0889eea6846eb03a48f9f52225be57e091a943af212a679f96feffdfb4152ea86210cc42ea56eda9ae92eb121c7fe34b26acd04

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\files_\system_info.txt
        Filesize

        3KB

        MD5

        1cc350c0d322e935eca1d97d3948d2a3

        SHA1

        c103b255015fff119b1ea9b2b1d12bf2f9a1b1ce

        SHA256

        fc4d8f06975a133b9eebf47df87ca42cd61d1c91321212c89fc553dd6c260b97

        SHA512

        9e0f7204eec59698591adee392f6f408adaccee132fc0c31863bdf112ba00a35005029518ad8baaba28a37b1f1c1c06aac51f666ba8b25ffb6a69e99ac3a9f3c

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\files_\system_info.txt
        Filesize

        3KB

        MD5

        4e4b83f092545a8bce084599f8e1f432

        SHA1

        76fe37ec5096fcac431100c07d3c2e782fb83c6d

        SHA256

        91ab45d3934a983f95cfad74278cbced15f69bb9f5702479a1f80b8af1b94ce0

        SHA512

        6752961381cb15acfae7dfa7f8bd790b122497e6361d1454326165284a4cf39d02c903337675e772e84c032aedde4c15ca0a5d3198cddcb3be75d291a9de7f78

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\files_\system_info.txt
        Filesize

        4KB

        MD5

        8a821edfbecef92ae4e9d692850edf37

        SHA1

        875af48645289494f52805ec82e99c37b9adc84a

        SHA256

        c05d09e0dfe9a2438126fdf9476e1b57acf62317826ddf3e9a0447bbb4a03c01

        SHA512

        1d9366ca9fd2cf201a047ab2593f08d3e9da423aa2d12324dfaf814d76409258dd611d290c11a5b94924e47de829548d6775d5cb7349c5545de322e3cbab0d33

      • C:\Users\Admin\AppData\Local\Temp\HkUcag4S\tfqfuofWfH0nU.zip
        Filesize

        34KB

        MD5

        ccd836995530b7e1bcb44c5a4c9ace2f

        SHA1

        10c1fa2055ec0366b29383ed000023dfb0cfde24

        SHA256

        e9bb88b4a9cf3751c36547dc58c59c238fdadf07aee5b094c15f800915a8a7d5

        SHA512

        2062d14d40a8946c80d72f55501efae26f25bb62aeefddd6165bd9799a09f53efb3962c50c8c315ea63a61872b16f45f3467ff1255a1d934b643b67b261ccf88

      • C:\Users\Admin\AppData\Local\Temp\Tar1DA7.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\bhlkvsjpne.vbs
        Filesize

        148B

        MD5

        5e4218c4de9614cb7eac4c871065f497

        SHA1

        1bfbad022bf64a2f446c31a65a54c809e862fb47

        SHA256

        f82f7970b4913d3e089d920af81fa93bbd060a77f9111d9946416a88c810e06e

        SHA512

        512ec3195a68e17161d247f06d3823fc7184c06751b1e08f25994bf730a07d0d8b6633f4458b4f3100a19067201d82a1f5092ff93e8889f6470b265b3958fa23

      • C:\Users\Admin\AppData\Local\Temp\epqntpjwxn.exe
        Filesize

        2.2MB

        MD5

        5328b7379d636a677406363321cf566a

        SHA1

        ad8a0ec5442ed0e607cf95bc163be3e9b9a0fb4c

        SHA256

        560e45cf3ad6e3e922aa5509f52717a605fe65867222b3c878e49e2fff78fcf7

        SHA512

        9d73183e9e18c4c39531b37f9a810da60d40b61524ef2afdbaf3feed55d2a7ed626d6d69d42e0f9e4bc2f5bd167481b32d6bb5b8811972be2a546f26a188daab

      • memory/1036-467-0x00000000001A0000-0x00000000001A1000-memory.dmp
        Filesize

        4KB

      • memory/1112-90-0x0000000001FF0000-0x0000000002514000-memory.dmp
        Filesize

        5.1MB

      • memory/1536-453-0x00000000023F0000-0x00000000023F1000-memory.dmp
        Filesize

        4KB

      • memory/1820-155-0x0000000002CB0000-0x0000000002CB1000-memory.dmp
        Filesize

        4KB

      • memory/1820-500-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-129-0x0000000000F70000-0x0000000000F71000-memory.dmp
        Filesize

        4KB

      • memory/1820-128-0x0000000000EC0000-0x0000000000EC1000-memory.dmp
        Filesize

        4KB

      • memory/1820-127-0x0000000000A40000-0x0000000000A41000-memory.dmp
        Filesize

        4KB

      • memory/1820-126-0x0000000000B90000-0x0000000000B91000-memory.dmp
        Filesize

        4KB

      • memory/1820-148-0x0000000000BA0000-0x0000000000BA1000-memory.dmp
        Filesize

        4KB

      • memory/1820-151-0x0000000000910000-0x0000000000911000-memory.dmp
        Filesize

        4KB

      • memory/1820-147-0x0000000000CD0000-0x0000000000CD1000-memory.dmp
        Filesize

        4KB

      • memory/1820-146-0x0000000000F80000-0x0000000000F81000-memory.dmp
        Filesize

        4KB

      • memory/1820-136-0x0000000000F20000-0x0000000000F21000-memory.dmp
        Filesize

        4KB

      • memory/1820-132-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-153-0x00000000028C0000-0x00000000028C1000-memory.dmp
        Filesize

        4KB

      • memory/1820-152-0x0000000000880000-0x0000000000881000-memory.dmp
        Filesize

        4KB

      • memory/1820-154-0x0000000000BB0000-0x0000000000BB1000-memory.dmp
        Filesize

        4KB

      • memory/1820-502-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-131-0x0000000000980000-0x0000000000981000-memory.dmp
        Filesize

        4KB

      • memory/1820-449-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-265-0x0000000000D20000-0x0000000000D21000-memory.dmp
        Filesize

        4KB

      • memory/1820-266-0x0000000000920000-0x0000000000921000-memory.dmp
        Filesize

        4KB

      • memory/1820-102-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-498-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-495-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-493-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-490-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-130-0x0000000000CC0000-0x0000000000CC1000-memory.dmp
        Filesize

        4KB

      • memory/1820-488-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-486-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-377-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-483-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-380-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-382-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-383-0x0000000002CB0000-0x0000000002CB1000-memory.dmp
        Filesize

        4KB

      • memory/1820-481-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/1820-476-0x0000000000F90000-0x00000000014B4000-memory.dmp
        Filesize

        5.1MB

      • memory/2240-5-0x00000000009F0000-0x00000000009F1000-memory.dmp
        Filesize

        4KB

      • memory/2240-2-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB

      • memory/2240-7-0x00000000003F0000-0x00000000003F1000-memory.dmp
        Filesize

        4KB

      • memory/2240-455-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB

      • memory/2240-456-0x0000000000B00000-0x0000000000B01000-memory.dmp
        Filesize

        4KB

      • memory/2240-1-0x0000000077150000-0x0000000077152000-memory.dmp
        Filesize

        8KB

      • memory/2240-385-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB

      • memory/2240-6-0x0000000000BA0000-0x0000000000BA1000-memory.dmp
        Filesize

        4KB

      • memory/2240-379-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB

      • memory/2240-376-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB

      • memory/2240-375-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB

      • memory/2240-8-0x0000000000400000-0x0000000000401000-memory.dmp
        Filesize

        4KB

      • memory/2240-4-0x0000000000B10000-0x0000000000B11000-memory.dmp
        Filesize

        4KB

      • memory/2240-3-0x00000000009A0000-0x00000000009A1000-memory.dmp
        Filesize

        4KB

      • memory/2240-10-0x00000000003A0000-0x00000000003A1000-memory.dmp
        Filesize

        4KB

      • memory/2240-264-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB

      • memory/2240-0-0x0000000000EA0000-0x000000000162D000-memory.dmp
        Filesize

        7.6MB