Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 17:36

General

  • Target

    f684fced30a37b2326a512579f5cc27e_JaffaCakes118.exe

  • Size

    4.4MB

  • MD5

    f684fced30a37b2326a512579f5cc27e

  • SHA1

    4ac631356b4383b01037ce5fc626981b2a033993

  • SHA256

    37592e4c0b1ed1f83461dc3c76091a60a76bd527026ee5563bc0ea7da02771f5

  • SHA512

    5092c8373038a8205c18d8f94b0b31249abe3ac4f7e938219513eef9589ab1a47a2decc2753263117282a1e19b5257c6bd9af2c61eccc01ec4c93e9698be9627

  • SSDEEP

    98304:dAUb2mh5bAvwspQqTDLqhr6+JaEPnjFDsHZpenABfal2BWRFHKuTeR9x:dymXbAZ2u8L8E7FI5KABicWRFdT+

Malware Config

Extracted

Family

cryptbot

C2

biss03.info

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f684fced30a37b2326a512579f5cc27e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f684fced30a37b2326a512579f5cc27e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Program Files (x86)\Ferr\SEDA\SX\bin\Setup.exe
      "C:\Program Files (x86)\Ferr\SEDA\SX\bin\Setup.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\IKk45ury & timeout 2 & del /f /q "C:\Program Files (x86)\Ferr\SEDA\SX\bin\Setup.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Windows\SysWOW64\timeout.exe
          timeout 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:992
    • C:\Windows\SysWOW64\CScript.exe
      "C:\Windows\system32\CScript.exe" "C:\Program Files (x86)\Ferr\SEDA\SX\bin\ipras.vbs" //e:vbscript //B //NOLOGO
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:3800
    • C:\Program Files (x86)\Ferr\SEDA\SX\bin\Setupres.exe
      "C:\Program Files (x86)\Ferr\SEDA\SX\bin\Setupres.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Ferr\SEDA\SX\bin\Setup.exe

    Filesize

    2.2MB

    MD5

    5eb17e5dffb7b83860fd650aa83d287a

    SHA1

    a94f2e71df2d64c2a183355c04660c485c7bd35b

    SHA256

    7fedad524e84d0d632b6cbf7ce6203531ef113894a0f78539ba41752c955e287

    SHA512

    8aced1ecc6936e91a1332aafedac23b630a86a107bddfb7e1bc6553cefe7ed2b26b869f0043f02fe28476044c742212c80d03f45324df43c7d5f2e47c7f95069

  • C:\Program Files (x86)\Ferr\SEDA\SX\bin\Setupres.exe

    Filesize

    2.1MB

    MD5

    6b3ee749de5e30937bc579153bb6fad9

    SHA1

    2930bd698db16026e5b2bb746fd87d52089c5521

    SHA256

    ec341ae659732f47c47ac51e26f79d248cd7f45bb29d439536d92a20b5fae131

    SHA512

    21b8a2b45ddb16883374bc7a2c2f407b7b6eab6e043c2f4995d5bce795c9e8fffae06ba776a0a0e918a00a4e8ea43cc894b23076d475579c3bb47247c145d659

  • C:\Program Files (x86)\Ferr\SEDA\SX\bin\ipras.vbs

    Filesize

    126B

    MD5

    b802ff9244875f69db2fae0f78e92b10

    SHA1

    49385a89cd575894a29fbda969b99cc1f5cf8076

    SHA256

    a1b0cb16fb2ecd66fccf156024404801ad694056e8a596326c1b27b57d8eabe8

    SHA512

    609856415a7ae2b3e260f945f1c8a8d2a28884c202d37181bea948708918f24b42ae03f17dba1520fddc91b2f7a182b0b8f885f33ea6f81bb3ee4c72e4e9350e

  • C:\ProgramData\IKk45ury\47283761.txt

    Filesize

    148B

    MD5

    c672c5ffd1a94b729484cc279d2a8a93

    SHA1

    3e3ce8ad41d3ffe36d461a21ded8fead5d11e88b

    SHA256

    087e2c68049f6d81393d62c9fbca232111ec9e0411f5cc9ab1e718475581eaea

    SHA512

    969821c1ea8ae7b400e0e603326a3eb76ad22c21572a12b34e50f97f174f53456e937872c1a5980f7401d702c56c00ec0c5fa4d9cdc38b7d2c6200037f12aae3

  • C:\ProgramData\IKk45ury\Files\_Info.txt

    Filesize

    8KB

    MD5

    bf25c27f78255a2b98ef2d6ead546832

    SHA1

    da2f6d04a4952912cb667710dadb51db6dd3d6b2

    SHA256

    4d01f34dd36f5bd3b941a0a7ab0ce0d17d5bafa228eb80e244221c2eb58406d0

    SHA512

    ae0089d733fb666a2dc7e8fae8bc7d79a341e598797db2b7b0ead7cdaabd674172ab52d911eaa32f5576568ce584f4737d839c7b1e78bc43ac4ef1b7583487fb

  • C:\ProgramData\IKk45ury\Files\_Info.txt

    Filesize

    788B

    MD5

    2af78bd55e56e3b7373bb5112c0cb053

    SHA1

    d808492dd6eeeedef4cc1c1b4f4205d184092a04

    SHA256

    527356096ed928d56bcadeccc95ca98784b40df7c5ed49d2f7e4b9c7e580cd64

    SHA512

    8455ecbf41e1659513b4bf516887bd491c7d922de1bb791f8746bcaed585d3fe5fef9378604e35e1dc7cb0a4de7ac186b3a5c3c84cfc74b794dddcb58bb890a4

  • C:\ProgramData\IKk45ury\Files\_Info.txt

    Filesize

    1KB

    MD5

    dd92369ec69b367c47b4e7c5e5d4e78c

    SHA1

    bd88b901e15a5de21f00d1bd658ae19543ae1d19

    SHA256

    fe50f07ea0caf2c156a6acad01a8b35e509803ec99b43d94e9dad7f6308cf7d5

    SHA512

    79d832bd641b9c07ab7417e906192f3ae256805feb5dd5993585c6319c58610c87cbe23f59e17d093ff94a72582cafa9b35012de0874585fb295db8b12f614b3

  • C:\ProgramData\IKk45ury\Files\_Screen.jpg

    Filesize

    52KB

    MD5

    398dbecbf5949da917bc9e2309ea5345

    SHA1

    79961c88cc058a182a69521ec5f8457a3cfbb835

    SHA256

    ff123724b78294234a8a167a76aaedca56b5641f3c05cd9b330f30c7a2bd0114

    SHA512

    40994e0d0bfe06b747d292d4cfc2bb50c30e3682c94377499ba70649fa27e075da0f79a68c3c8c3eb5f78f83030a5bb3f31e0787875180481baed2ffe91ffb94

  • C:\ProgramData\IKk45ury\MOZ_CO~1.DB

    Filesize

    96KB

    MD5

    40f3eb83cc9d4cdb0ad82bd5ff2fb824

    SHA1

    d6582ba879235049134fa9a351ca8f0f785d8835

    SHA256

    cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

    SHA512

    cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

  • C:\ProgramData\IKk45ury\Nh3JNemNf.zip

    Filesize

    48KB

    MD5

    bf531446bda65a0bb598ae94e0626ea3

    SHA1

    22994ed76cfd55943044316036511a09208fb3f4

    SHA256

    2535fb84c99e6b4c02c55e7675bd348ee3154f6db459a7c55263c8bb4dfbc5b4

    SHA512

    b74243a0debe983d1d718999e8c7f20238901da1c55e8d8fb4b125527478bcd381063dee1b6ba8bba785aefffc63d2891c6fe36a3ccae909d93cc66b69c2dde6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    3bc1e3b8e37028a9b8205589f8e3d9a9

    SHA1

    e82994e5add4560307774ab35df146654a4eb711

    SHA256

    92ad9595ae6ea6414129f8b4226a468fc47b41ba64297e5815f6ff279f3a1bba

    SHA512

    952bc1619838aeec2a0fa8adc3868ebbbafd5123b5e7589c251027ad9e6b5f42cc766701eb30a93807e6a05a5ae7ba85f9dbcc44dc53f0bbca7d4cff3625de24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    bc5f0b7243bb302a95d7b7f634224a6a

    SHA1

    675d57903d3ba3d538cf94f09b26e47ca18d9128

    SHA256

    fc5e121e099b11424a569776f557d1862bff5e342a92ccfa7f42924a53d33384

    SHA512

    a6629f5818aec75e8c41aab95758f4cc91533dddfa2364a5b746141c73a498038c5f05d6219c6aa1223faabb2e77b5c40a37e04cde1bd962576a6a13f46d44b9

  • C:\Users\Admin\AppData\Local\Temp\nskC593.tmp\UAC.dll

    Filesize

    14KB

    MD5

    adb29e6b186daa765dc750128649b63d

    SHA1

    160cbdc4cb0ac2c142d361df138c537aa7e708c9

    SHA256

    2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

    SHA512

    b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

  • C:\Users\Admin\AppData\Local\Temp\nskC593.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    132e6153717a7f9710dcea4536f364cd

    SHA1

    e39bc82c7602e6dd0797115c2bd12e872a5fb2ab

    SHA256

    d29afce2588d8dd7bb94c00ca91cac0e85b80ffa6b221f5ffcb83a2497228eb2

    SHA512

    9aeb0b3051ce07fb9f03dfee7cea4a5e423425e48cb538173bd2a167817f867a30bd4d27d07875f27ca00031745b24547030b7f146660b049fa717590f1c77e1

  • C:\Users\Admin\AppData\Roaming\bfgvdfc.exe

    Filesize

    14KB

    MD5

    835e823182337ef73c9439066da13a51

    SHA1

    0bfd62e4c6c6e5024b13be95d4f1c74c79e03883

    SHA256

    8dcb058a78f8d4286ad0afd8adcbab440cdfa39ab9cf50a9d2666203acba04a6

    SHA512

    557d2a2b0ed20f38aa51c1af77d8a09177bade760f72376b6610b8793a19e7ed92755e72a0ac9c1e9a8240a6316672ad76e3205d0756f1499a90c731b7a731be

  • C:\Users\Admin\AppData\Roaming\ytgrfvdcrvfcd.exe

    Filesize

    14KB

    MD5

    82f20940c910ed1fc4061dce8ac330d9

    SHA1

    1c81e39690fb45fbae5180ab224265ef527011c5

    SHA256

    0c83c1869a04f1589c793bf40b6e365112fba64b23d3867052f9d59699e97b43

    SHA512

    84c42953f847aa74a7813c4875a0bdb1f7646458b23368cd181dbcaeca2466247fd58945ea548d69bcb216338886d7406e9d618694fc19381f35567d76ffbfd7

  • memory/2040-306-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-280-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-276-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-59-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-261-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-196-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-197-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-258-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-284-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-288-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-202-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-302-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-206-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-310-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-210-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-314-0x0000000000400000-0x0000000000926000-memory.dmp

    Filesize

    5.1MB

  • memory/2816-204-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-208-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-201-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-256-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-198-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-260-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-195-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-194-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-274-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-192-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-278-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-62-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-282-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-55-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-287-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-40-0x0000000004B40000-0x0000000004B41000-memory.dmp

    Filesize

    4KB

  • memory/2816-41-0x0000000004B60000-0x0000000004B61000-memory.dmp

    Filesize

    4KB

  • memory/2816-301-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-42-0x0000000004B70000-0x0000000004B71000-memory.dmp

    Filesize

    4KB

  • memory/2816-305-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-45-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-309-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-43-0x0000000004B10000-0x0000000004B11000-memory.dmp

    Filesize

    4KB

  • memory/2816-313-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-44-0x00000000005C1000-0x0000000000620000-memory.dmp

    Filesize

    380KB

  • memory/2816-315-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB

  • memory/2816-35-0x0000000077574000-0x0000000077576000-memory.dmp

    Filesize

    8KB

  • memory/2816-31-0x00000000005C0000-0x0000000000B06000-memory.dmp

    Filesize

    5.3MB