Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 20:31

General

  • Target

    fadc761864c9f8819b963a0bdc893357_JaffaCakes118.exe

  • Size

    4.3MB

  • MD5

    fadc761864c9f8819b963a0bdc893357

  • SHA1

    ee8643450535ba5a0ddfe80076241fa0ba10fc53

  • SHA256

    08ef6479ea772726db377eb7251bf448877d3c1867242865def381222c5149a8

  • SHA512

    712631c50fe0cf61278d194eb30d10f8940b9068dd906d8b3d9cc14b7639123cb8e4dc4bddd9e9ef768c86b0cda066b7886a3961cf9c0bdf69e96a58d985171e

  • SSDEEP

    98304:fhEgSFNWFMdWzbWnw1pxFIlVpyOjE6MYTh7KQsRhIxk9:fyBTw1p4onQsfIxk

Malware Config

Extracted

Family

cryptbot

C2

nife01.info

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fadc761864c9f8819b963a0bdc893357_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fadc761864c9f8819b963a0bdc893357_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\ProgramData\Unicodek\Unius.exe
      C:\ProgramData\Unicodek\Unius.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:2780
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\ipras.vbs"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\UDJnEZiqvgP3FUk\172773668.txt

    Filesize

    148B

    MD5

    c672c5ffd1a94b729484cc279d2a8a93

    SHA1

    3e3ce8ad41d3ffe36d461a21ded8fead5d11e88b

    SHA256

    087e2c68049f6d81393d62c9fbca232111ec9e0411f5cc9ab1e718475581eaea

    SHA512

    969821c1ea8ae7b400e0e603326a3eb76ad22c21572a12b34e50f97f174f53456e937872c1a5980f7401d702c56c00ec0c5fa4d9cdc38b7d2c6200037f12aae3

  • C:\ProgramData\UDJnEZiqvgP3FUk\7RFgVN87a3.zip

    Filesize

    47KB

    MD5

    11c2715b17d83ae8da83658c96fbffb8

    SHA1

    9acb8348d4e2267b8b7097e6090821c9628f535c

    SHA256

    7db699662ffe63924e902ab1000b5f810403a7c55956dd1cb9699692bf85b3e3

    SHA512

    8b99607c931bb59b6a183717667c4f9cfc667acdce7bfed4e971eb9b9aec2a39d7db86b685ffd31be326cc0633ac7b1254439f2591560fa2935b17f3a3c71507

  • C:\ProgramData\UDJnEZiqvgP3FUk\Files\Browsers\_FilePasswords.txt

    Filesize

    3B

    MD5

    ecaa88f7fa0bf610a5a26cf545dcd3aa

    SHA1

    57218c316b6921e2cd61027a2387edc31a2d9471

    SHA256

    f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5

    SHA512

    37c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5

  • C:\ProgramData\UDJnEZiqvgP3FUk\Files\_Info.txt

    Filesize

    1KB

    MD5

    a6d4fbd2214963f0a44d260e2225a0d7

    SHA1

    c457e19e944dec38d0aeac5d485d93ad5765c773

    SHA256

    5380ef9e73abda238d4fe6344e7a08b106d981f57a3016cae619956e4b748571

    SHA512

    7d28b8f25272e2fc1db07f82d89c296d551f4c5de08d54c8e4ee218535849966e2efbdea6cf0f9a8226840936e1cbf7de7a3c724cf51947d585ff284bcf04b2e

  • C:\ProgramData\ipras.vbs

    Filesize

    126B

    MD5

    c6362e3c5585f24a9e9a2712c00c52ff

    SHA1

    9259b9609313386f004328d2c306820eae01a587

    SHA256

    184ca5b2737175e0828f3546d483778c95e23720f1375deac0090c2fe415e208

    SHA512

    59ac94fdb6f41d6dc5cbea1855897759f35032ac922b936a0b39a21b6aafb0c862c5d419afa31c0b81f106f2ce06b2909cdb5fb713534fbe36202c5a4fedfeaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    93513a629a7c8aad8bc873c9447d158e

    SHA1

    09ca1c8ed380a1956f00d2422819c4c9be411175

    SHA256

    e4a75a4fe883822b3a664a5f8f521a2618276a60b8f033b542e1f7c26ce4b8dc

    SHA512

    26fc50319e4279318d19ea3f163002a5ff01e2e30c37cd66a3b584257a582cf78586f1282f15fea686686e791dbb517a6052c3a2efcf6dd71fa7e492ebc33081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    ff414092a15486e355127ea2b482a849

    SHA1

    198b1705ddac4d20e1e811c26c03d610e0da1af8

    SHA256

    cf3b54591489fedc733a67b9f04f5760dafcff76cc3df9f84bcfaed835b71441

    SHA512

    53a7690d470890314e05c9f63cab7fe46b27f702686929b11116548365ad4d859bc9323bac975a2cab6d36ac83d94c36159042374d3914b90d7884bed0fa9f1e

  • C:\Users\Admin\AppData\Local\Temp\CabE9A4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • \ProgramData\Unicodek\Unius.exe

    Filesize

    2.2MB

    MD5

    da4cba039da84811abbe2d7b73efa488

    SHA1

    5eaabd7ed6d1552dcdec225ecd7d8a8d4e7c43b2

    SHA256

    f852161c46e2b5edd38cd552562afc7a5d14435d1a6a373a87ca18df2ebc76c6

    SHA512

    8d2569fed7a67e54938b665359ab7476c24369fe8f95b3fbad51c0ef787300131db3340d4ff712f857473807da975980a38e1ce303bd48bf41b4ec4086e6ffa5

  • memory/1292-241-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-104-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-13-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-14-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-15-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-17-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-3-0x0000000009010000-0x0000000009011000-memory.dmp

    Filesize

    4KB

  • memory/1292-21-0x0000000009E90000-0x000000000A3E9000-memory.dmp

    Filesize

    5.3MB

  • memory/1292-251-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-4-0x00000000097B0000-0x00000000097B1000-memory.dmp

    Filesize

    4KB

  • memory/1292-27-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-248-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-244-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-211-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-237-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-234-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-231-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-101-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-228-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-2-0x0000000009770000-0x0000000009771000-memory.dmp

    Filesize

    4KB

  • memory/1292-5-0x0000000009730000-0x0000000009731000-memory.dmp

    Filesize

    4KB

  • memory/1292-6-0x0000000009790000-0x0000000009791000-memory.dmp

    Filesize

    4KB

  • memory/1292-7-0x00000000090A0000-0x00000000090A1000-memory.dmp

    Filesize

    4KB

  • memory/1292-129-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-0-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-225-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-8-0x0000000009780000-0x0000000009781000-memory.dmp

    Filesize

    4KB

  • memory/1292-9-0x0000000009020000-0x0000000009021000-memory.dmp

    Filesize

    4KB

  • memory/1292-10-0x0000000009090000-0x0000000009091000-memory.dmp

    Filesize

    4KB

  • memory/1292-11-0x0000000009740000-0x0000000009741000-memory.dmp

    Filesize

    4KB

  • memory/1292-12-0x0000000000401000-0x000000000045D000-memory.dmp

    Filesize

    368KB

  • memory/1292-202-0x0000000009E90000-0x000000000A3E9000-memory.dmp

    Filesize

    5.3MB

  • memory/1292-221-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-218-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-206-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-215-0x0000000000400000-0x0000000000B4D000-memory.dmp

    Filesize

    7.3MB

  • memory/1292-1-0x00000000772C0000-0x00000000772C2000-memory.dmp

    Filesize

    8KB

  • memory/2780-131-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-210-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-208-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-213-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-207-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-217-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-204-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-220-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-203-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-223-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-142-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-227-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-102-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-230-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-98-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-233-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-93-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

    Filesize

    4KB

  • memory/2780-236-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-94-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

    Filesize

    4KB

  • memory/2780-240-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-95-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/2780-243-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-96-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/2780-246-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-97-0x0000000000C51000-0x0000000000CB3000-memory.dmp

    Filesize

    392KB

  • memory/2780-250-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB

  • memory/2780-23-0x0000000000C50000-0x00000000011A9000-memory.dmp

    Filesize

    5.3MB