Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 15:48
Behavioral task
behavioral1
Sample
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
eb6b6b4f0970c825bbde733784027a52
-
SHA1
33e928ccbe9fb3088a0e94ece28b39cc9ccac8ef
-
SHA256
c9cf9521886aaa99c317b33c9fd5a8f82be1fe61d8616bc6ce8a10c4d26b6e21
-
SHA512
debe1809b3f8d0011979a852bc6dd7c63ea1e1b1648c66f1db611caf27ac5c988c384bdfaebaef8f59fc1750954675270057e1949917752b38ea7baad6fa24d6
-
SSDEEP
49152:RPO2xOD0wD6XH67JeVIE1iplrlhwaT4dn/kFjkOWS356NhOHYGWOBJZ8bCd4YIg:R22a0oJeKEwBln4dcFjCC6NhEvWOvk
Malware Config
Extracted
cryptbot
bundky32.top
morfug03.top
-
payload_url
http://tobhay04.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3232-3-0x0000000000E20000-0x00000000015A9000-memory.dmp family_cryptbot behavioral2/memory/3232-4-0x0000000000E20000-0x00000000015A9000-memory.dmp family_cryptbot behavioral2/memory/3232-5-0x0000000000E20000-0x00000000015A9000-memory.dmp family_cryptbot behavioral2/memory/3232-6-0x0000000000E20000-0x00000000015A9000-memory.dmp family_cryptbot behavioral2/memory/3232-7-0x0000000000E20000-0x00000000015A9000-memory.dmp family_cryptbot behavioral2/memory/3232-211-0x0000000000E20000-0x00000000015A9000-memory.dmp family_cryptbot behavioral2/memory/3232-224-0x0000000000E20000-0x00000000015A9000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/3232-0-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-2-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-3-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-4-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-5-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-6-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-7-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-211-0x0000000000E20000-0x00000000015A9000-memory.dmp themida behavioral2/memory/3232-224-0x0000000000E20000-0x00000000015A9000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exepid process 3232 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exepid process 3232 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe 3232 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exepid process 3232 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe 3232 eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb6b6b4f0970c825bbde733784027a52_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fvkJdtku\_Files\_Information.txtFilesize
1KB
MD5bf67280e773a065a106078b449834df2
SHA1248ca1eeaf633ce7148cc23821b7f3dc4bbe96fe
SHA2566cfd128a5ac8c69fae88f7fb5a03b37a65f04d1cdb2b6d0fa899927a0351d510
SHA512c6ccc634640f16331fa66822acbf32b7bb9f36d190c78d4ecbf02486a43ca52754281da6223bf363e7ed0a50d19749a3259297bbd7cebd4373be8b83ab692eb4
-
C:\Users\Admin\AppData\Local\Temp\fvkJdtku\_Files\_Information.txtFilesize
4KB
MD5571920c82a40894e041f036a773bb861
SHA1e6344a3462cfed5ce79e218e281608db88008760
SHA25632f5a97eba2f09975639d5137e16cedd7ef1f6ff42464b464b344547a248aab4
SHA512c77c0ffac76a45d8e1abc2b1f9bf2c58de12ac4e2d7e29c6510b9e9305f25c6a41766e76640045c64ddcca05ce98f907ccc956f4b13f2cce6aa823dd07da5611
-
C:\Users\Admin\AppData\Local\Temp\fvkJdtku\_Files\_Screen_Desktop.jpegFilesize
55KB
MD568b6819611a0dd7b052d174668798f4a
SHA1ed1a37e666b3dca7a23445acfa31aba1357c2e3a
SHA256e1b7252b5fb8ee282cedfe81fad733ca385e990dbc17adf2613c1dd9fe6bfa70
SHA51215d7c4c990ceec37992f7abe32c0671612777feb4fe6f4dac1a974ad91fd79e5d1e97b1c60962c21bfd314d0eaf361d8671eb29fcd3506c99c36ad4d19c133e2
-
C:\Users\Admin\AppData\Local\Temp\fvkJdtku\afICUPgZmrou.zipFilesize
49KB
MD5263537cfe3e88449074824e53f3d4c4d
SHA152e368dea8195a57c64fb036e04aed2a0d973c73
SHA25677f1feffee72ef4e4d61b9f6a53a9bdce91928c14e550fe7df70db9a80c8cbe2
SHA512f98372e7822dbdbf74a6dc198df0081fbfac6359c8271d6d9c2ada5e4b65b1d7cfe2a8e3d36e9df6ced196c2c3c0236c0dfe4111fc2e5c501f0746197845fcd5
-
C:\Users\Admin\AppData\Local\Temp\fvkJdtku\files_\system_info.txtFilesize
7KB
MD5c195472df1507f222ed045c7635da0f9
SHA1b6d617ff1ac150ad1f2e5bae38fd89472a882736
SHA2563c09260f002c2b141d2825c67bb157d67fa95991ae68e7959328db9d0cca9846
SHA512d95061b294e1ac8d555c56743242b071753bd52ade307d961f4b6020999abe845b76d0f68797507923b06a5193cdcaa395bde57ef56189098c7d867ad4ba5df2
-
memory/3232-3-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-6-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-7-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-5-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-4-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-0-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-2-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-211-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB
-
memory/3232-1-0x0000000076EE4000-0x0000000076EE6000-memory.dmpFilesize
8KB
-
memory/3232-224-0x0000000000E20000-0x00000000015A9000-memory.dmpFilesize
7.5MB