Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Sibuia.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Sibuia.dll
Resource
win10v2004-20240802-en
General
-
Target
d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
d0d341d2d2f0f61a4c403b88085e3576
-
SHA1
bf8c04ebd83d850cfafce00c49b0ea2646acedee
-
SHA256
cef1d3f10fdb50df41e0dcb5c77e45c4587adb76747259ce893ceabb863d9994
-
SHA512
b35c7ccd2d7df90efe8457cfcfb8a13353216bb83c9900cdf64916e2956f0852d0272216679b10cd669db44db15c5fef0a6427bf3a2752cb585626144b0df95c
-
SSDEEP
49152:zOdVHtDhAcN9W4L0bXIOyyB85hOTm8z3th24azqaNBJkLy0vq3dsJ8zYNawVG9aE:CXNucUnyJ09h24azvFYyeU7kREDBZ
Malware Config
Extracted
cryptbot
bibinene03.top
moraass05.top
Signatures
-
CryptBot payload 20 IoCs
resource yara_rule behavioral2/memory/3716-31-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-32-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-140-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-249-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-250-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-251-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-253-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-255-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-258-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-261-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-264-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-267-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-270-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-273-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-276-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-279-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-284-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-287-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-288-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot behavioral2/memory/3716-291-0x0000000000890000-0x0000000000DD2000-memory.dmp family_cryptbot -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5.exe -
Executes dropped EXE 1 IoCs
pid Process 3716 5.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine 5.exe -
Loads dropped DLL 3 IoCs
pid Process 4908 d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe 4908 d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe 4908 d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3716 5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3716 5.exe 3716 5.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3716 5.exe 3716 5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3716 4908 d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe 85 PID 4908 wrote to memory of 3716 4908 d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe 85 PID 4908 wrote to memory of 3716 4908 d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0d341d2d2f0f61a4c403b88085e3576_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\sib8724.tmp\0\5.exe"C:\Users\Admin\AppData\Local\Temp\sib8724.tmp\0\5.exe" /s2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3716
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD56a3c3c97e92a5949f88311e80268bbb5
SHA148c11e3f694b468479bc2c978749d27b5d03faa2
SHA2567938db73242aafbe80915e4ca886d38be9b7e872b93bdae1e8ee6cf4a005b7d9
SHA5126141886a889825ccdfa59a419f7670a34ef240c4f90a83bc17223c415f2fbd983280e98e67485710e449746b5bf3284907537bef6ab698a48954dd4910ddf693
-
Filesize
41KB
MD5e431d352758f260b720fb5b7770ce2c7
SHA11797c4a250d3304360637afed071ce79c49b8f93
SHA256b2c4b5c7d34c23de458456ff4279f0e990af0402534606a0778777a250a8525d
SHA51247f94085dab3841f182b3552c466185b3722cb284c44851cb58ea1fcdca09c3d5c189dae959eb3354c2470998a0681555e3a3de30a423edcadf0d3ebc2aa9d26
-
Filesize
7KB
MD54bd368aca3d7fba91d830eade3da6619
SHA1d49f521dc61d9c769fa52e97da9194086da4cf4b
SHA256212fb652dcdbab57b95e8a3e8c31c6abc3979a8877ced87c3bc34156a3bb2f64
SHA512428e48824e41f3f0649970e6ed6a6d2da31d7d938724db3d2b864a90a5088400cc7ba2d95457cf575b133dfb629c1e5d7dc4fac161f3eee952c725cc54855b8f
-
Filesize
47KB
MD531c9f2cf83d0505d08e98a8b14c405c1
SHA1d3b685372982721eb04868a354b072e64d01d583
SHA256f009588fa20c9da403666797703bd8f3726f2ab57fb2b56886b416bb51644797
SHA5129150c550d6402eb05fd900792c37054aece8436b6f4ba991b0da16b5af4054e128e4280f8ef3aaf80ea88956fed2edb934a77ee04cd7d76d073b882aebc9e5ad
-
Filesize
684B
MD58000f437c9908150ad69673e44f4477b
SHA14ba18deacbf7f081be3f0eec5a2605a5116679ee
SHA2567e44605748da7dca4797b675bc4c410ecf49e17a159d5a51defe4c91236a22db
SHA51244c79967185ad60540afb67c5bf3e34cdeaa2861fa2f15243a7c053632484a2506bdb39875b1701dc439eb2a742c851d17501fb6d0f6071bd5ae8ec5aeb35244
-
Filesize
7KB
MD565d04c6a938bdd401dea064c96edb404
SHA103315ea5c82e1592d730e5ccabd1225ade0b8c7a
SHA256078b75b33080114dd79b00797a598670a8c021242e3c2ae010966c77d0526746
SHA512239ef0ce850ded5d0fa728ec492f78268a3f34a97a6c23374385e23ece47c6e7a6e2bc4b047b57fc7228e2d51a245be517c99488c26ef028fae4e45038f1fe2d
-
Filesize
41KB
MD51c5b2e2c9f98521a472dc08e6a59f1b2
SHA1070d1085f30cbe12fba864a19720862100a33c1a
SHA2563ae2484afcc63feb6c9a7b4f913a945de2a1930b06b03c46c13cf00aaff98fbd
SHA512f77887bb7c055812dbf46165c80bdcadee535cba7bf5eba719c38b514d2d0bfd1ea492f5308348690d013ead261d452b78c83686ae76916e47783c68ed152e36
-
Filesize
2.3MB
MD508caa80b61ee95e610a26d52820e3efd
SHA12dd92ecd34ada8962201929310e278346264b6b0
SHA2568d5eb7cd6f951771498f4b92d148d6e1401631765996be53d9fd773589bcf2a0
SHA51265dbc03fcb2762465f8e4448220915e85257a4d370cb14382c45e719cfa3cc2913bc0580b28d69f0ad380e5cf3a9afbcac207d59f3253e5ec6124b2495f69bdc
-
Filesize
51KB
MD55ea6d2ffeb1be3fc0571961d0c4c2b5f
SHA1902dfe9ae735c83fb0cb46b3e110bbf2aa80209e
SHA256508336b6a7c3226738e74f6ce969e828da904ad9f7610b9112f883a316ee9222
SHA512e81657087f451a37f06a07bf84175117fdaf75d5d8b84cbdc49497fcf88f96e259074518ea3037680d27c9eaeebd7a8df496297593fead88d7edea202a572585