Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 18:25

General

  • Target

    fce34b7c245a178aa22b455b2a05c09a_JaffaCakes118.exe

  • Size

    4.2MB

  • MD5

    fce34b7c245a178aa22b455b2a05c09a

  • SHA1

    f02262ddfe1ca17807d1fd274a0c854a76b515b5

  • SHA256

    181b4cf28d0bb74fe05b2d1b7a267e8b2d5bf68d0c8a6e1a63b1605d8961f4f1

  • SHA512

    d7be7635dd0fdd84d5128aa03dd11d2bb8b3a43ff1894ffb0d6be0836caa2a42955046a02aebb63a9be168575ad6282744a3489d4f273d4853c3ea68430b7fdd

  • SSDEEP

    98304:vhyHcgzsj1WTf2VuX9j0Z6T3cQwZnmRcX:vhyBhYC+Q3cpZmU

Malware Config

Extracted

Family

cryptbot

C2

bibinene01.top

moraass05.top

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 15 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fce34b7c245a178aa22b455b2a05c09a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fce34b7c245a178aa22b455b2a05c09a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\sib5063.tmp\0\d3.exe
      "C:\Users\Admin\AppData\Local\Temp\sib5063.tmp\0\d3.exe" /s
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RNCMoFlfXn\_Files\_Information.txt

    Filesize

    8KB

    MD5

    1966c58435da8e675ae29247f928536a

    SHA1

    98bdb3bc595d087861d53aac075761e440396a71

    SHA256

    ac204b27ce2cce2946e5124edf33a346c6a07d8ef2582b99202ad17d3a14a0f9

    SHA512

    d12dc63f68d44aa7e38e359abb0c21edfa8a9978f66cfb2e2aa91374a45e7a68c5d1e9ecb7667f882b859da53918aa4473c10068750788e2782083d39164e006

  • C:\Users\Admin\AppData\Local\Temp\RNCMoFlfXn\_Files\_Screen_Desktop.jpeg

    Filesize

    47KB

    MD5

    93b6a6fd3b8e432bd4d79e0f7bc9e6be

    SHA1

    4a7a016612c66beb190a4e24adb10b25d7a9783f

    SHA256

    30eb55bf1f80f4784b28a033a850782418a8afadc3d93597497437aec06f1723

    SHA512

    d77e9d23d951e81233067d05ca1ab00bf6d11f98e78af1ab17f0a94641d67a59aaf1a6647316a93636a1af2e63ae58e8db2bed3d8890e43d3addc56e1faf22b8

  • C:\Users\Admin\AppData\Local\Temp\RNCMoFlfXn\files_\system_info.txt

    Filesize

    8KB

    MD5

    19df2efc50cc8596adc57654e1c647a9

    SHA1

    6ecf75648b594a38e16c53d255c89850d10ec699

    SHA256

    dc6a6660df349f20f95757d722a7ecbe6a5a1c54bfeee43bc58d4d3b4fbe5680

    SHA512

    106d6067ac97d7d71de7c6c057170f9a77a29830342400999b2eceea304d376828f3bbcc73939fd4ea4356d35403ed6fb4b2316d65a6bdb6af474ef635bf2d6c

  • C:\Users\Admin\AppData\Local\Temp\RNCMoFlfXn\vistuWJa736Iln.zip

    Filesize

    40KB

    MD5

    3fef6fc5870ee38f19ac89ee5359d5c8

    SHA1

    e6941d60f2a65106194f07f38849118fc01a0c71

    SHA256

    4c770dbec90061dcd87e346dabf5d759ae5b605d679d358133461897e66506a9

    SHA512

    113ed585125f55ad87ab83c8a64555e0281f841f00dd18371626abf5bdb19aa482c113672a2d247505332430469b1aae5b56af3202eed4f09af059c7bd8d3c74

  • \Users\Admin\AppData\Local\Temp\nse4FB7.tmp\Sibuia.dll

    Filesize

    524KB

    MD5

    6a3c3c97e92a5949f88311e80268bbb5

    SHA1

    48c11e3f694b468479bc2c978749d27b5d03faa2

    SHA256

    7938db73242aafbe80915e4ca886d38be9b7e872b93bdae1e8ee6cf4a005b7d9

    SHA512

    6141886a889825ccdfa59a419f7670a34ef240c4f90a83bc17223c415f2fbd983280e98e67485710e449746b5bf3284907537bef6ab698a48954dd4910ddf693

  • \Users\Admin\AppData\Local\Temp\sib5063.tmp\0\d3.exe

    Filesize

    2.0MB

    MD5

    5679098942a9c1dcc31af77ebf48c70d

    SHA1

    62f0b999c5afc8df86b4f436c2b0e4d6c26d8fde

    SHA256

    8b62f2ef1863eb1a526ff2f68c4031a39f92f4fe1a481e9212d483c3b468f08a

    SHA512

    40b452061b1120e41cf18c06627d3501006eed1dd4f9904e770c56ccd6662faa66ee14cd7a8a0237262249fe7d00f9aeb8721e909bb410e10bd22800a2cffa3c

  • \Users\Admin\AppData\Local\Temp\sib5063.tmp\SibClr.dll

    Filesize

    51KB

    MD5

    5ea6d2ffeb1be3fc0571961d0c4c2b5f

    SHA1

    902dfe9ae735c83fb0cb46b3e110bbf2aa80209e

    SHA256

    508336b6a7c3226738e74f6ce969e828da904ad9f7610b9112f883a316ee9222

    SHA512

    e81657087f451a37f06a07bf84175117fdaf75d5d8b84cbdc49497fcf88f96e259074518ea3037680d27c9eaeebd7a8df496297593fead88d7edea202a572585

  • memory/2800-250-0x0000000001380000-0x0000000001889000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-266-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-30-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-28-0x0000000001380000-0x0000000001889000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-31-0x0000000077000000-0x00000000771A9000-memory.dmp

    Filesize

    1.7MB

  • memory/2800-27-0x0000000001380000-0x0000000001889000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-282-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-279-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-277-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-275-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-249-0x0000000001380000-0x0000000001889000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-251-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-252-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-255-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-273-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-257-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-259-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-262-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-264-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-29-0x0000000001380000-0x0000000001889000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-268-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-270-0x0000000000E70000-0x0000000001379000-memory.dmp

    Filesize

    5.0MB

  • memory/3024-10-0x0000000077000000-0x00000000771A9000-memory.dmp

    Filesize

    1.7MB

  • memory/3024-14-0x000000000EBF0000-0x000000000EC02000-memory.dmp

    Filesize

    72KB

  • memory/3024-248-0x000000001CEF0000-0x000000001D3F9000-memory.dmp

    Filesize

    5.0MB

  • memory/3024-15-0x0000000010EA0000-0x0000000010F5A000-memory.dmp

    Filesize

    744KB

  • memory/3024-22-0x000000001CEF0000-0x000000001D3F9000-memory.dmp

    Filesize

    5.0MB