General
-
Target
fce34b7c245a178aa22b455b2a05c09a_JaffaCakes118
-
Size
4.2MB
-
Sample
240928-w2s3cszcmr
-
MD5
fce34b7c245a178aa22b455b2a05c09a
-
SHA1
f02262ddfe1ca17807d1fd274a0c854a76b515b5
-
SHA256
181b4cf28d0bb74fe05b2d1b7a267e8b2d5bf68d0c8a6e1a63b1605d8961f4f1
-
SHA512
d7be7635dd0fdd84d5128aa03dd11d2bb8b3a43ff1894ffb0d6be0836caa2a42955046a02aebb63a9be168575ad6282744a3489d4f273d4853c3ea68430b7fdd
-
SSDEEP
98304:vhyHcgzsj1WTf2VuX9j0Z6T3cQwZnmRcX:vhyBhYC+Q3cpZmU
Static task
static1
Behavioral task
behavioral1
Sample
fce34b7c245a178aa22b455b2a05c09a_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
bibinene01.top
moraass05.top
Targets
-
-
Target
fce34b7c245a178aa22b455b2a05c09a_JaffaCakes118
-
Size
4.2MB
-
MD5
fce34b7c245a178aa22b455b2a05c09a
-
SHA1
f02262ddfe1ca17807d1fd274a0c854a76b515b5
-
SHA256
181b4cf28d0bb74fe05b2d1b7a267e8b2d5bf68d0c8a6e1a63b1605d8961f4f1
-
SHA512
d7be7635dd0fdd84d5128aa03dd11d2bb8b3a43ff1894ffb0d6be0836caa2a42955046a02aebb63a9be168575ad6282744a3489d4f273d4853c3ea68430b7fdd
-
SSDEEP
98304:vhyHcgzsj1WTf2VuX9j0Z6T3cQwZnmRcX:vhyBhYC+Q3cpZmU
-
CryptBot payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2