Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2024 07:08

General

  • Target

    65ee316a2bf447f5b8d9b9202741aaf0_JaffaCakes118.exe

  • Size

    977KB

  • MD5

    65ee316a2bf447f5b8d9b9202741aaf0

  • SHA1

    d231b371e6a7def22b68a3eea9bbce65c6df807c

  • SHA256

    b3c8a5ac1a6ec0090d47b5c92b153505ae7dc45541b826dc26104321b4b1acb5

  • SHA512

    14eebe6875c48d4662d3a3f3a30ecd7278952fef265a1291fab83b462b5ad04b8e438a8c7722cdeeec711256cf089756719af2178c4efd9eb090aa5c3a3d11fb

  • SSDEEP

    24576:htzNGaLv/OMyROGRNSQ/SEdgfp9tmHywc+qrn:PzgGvGPOG3PgLtmSL+m

Malware Config

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65ee316a2bf447f5b8d9b9202741aaf0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65ee316a2bf447f5b8d9b9202741aaf0_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Windows\SysWOW64\dllhost.exe
      dllhost.exe
      2⤵
        PID:4276
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Ingannaste.csv
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3552
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:644
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^xEnQvhvTRxzjeevqkckuiiCkNbKORUyPRQVatfkfnjwAyOoOetjLAvuheheYDHwXfExjurWVlWIUuwuYfVMNHxgcJIdRjjMRkt$" Pie.csv
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3504
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talismani.exe.com
            Talismani.exe.com A
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4648
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talismani.exe.com
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talismani.exe.com A
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1340
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            4⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1096

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Declinante.csv

      Filesize

      1.1MB

      MD5

      3109ef25620ebfeceeb3c7030e72873a

      SHA1

      6179abc0b85f72399042b11a896bf5a78b8161b5

      SHA256

      29b7b4534ff0589c76a7c1704de5e0787a7412898464fa0560d94c6e9f8c3962

      SHA512

      22f0f9b8d308feed7c786c539856cb2c6ae2dda08e3c9874df68f79861ccb517e87d3b4e3409ce17a8706862ea85341362a3470a0a34ffb1fb5bb166276a8b3e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ingannaste.csv

      Filesize

      478B

      MD5

      0828b2a143d24ff624ae6fb601d0f160

      SHA1

      96d3a0166afd7dc6c9ded43d8007650441892a58

      SHA256

      5c75de4d2d54dc79b774d06e5c500a26cb84da1bbbf13c5cf21cfabbe9724a32

      SHA512

      b69a4a9d7ff7f5f529c3eda0a154bfe82a5a8b054126e216060f0dd87fe71868f6077fa68f42d5ef3cab8c440f91c8b94071d756d792c2ec4d7fc7d1bdcda757

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pie.csv

      Filesize

      872KB

      MD5

      e1dfd628ee581746f7573507e5574c81

      SHA1

      390c3b5b376a96068005148d9fe930ef1861dcdc

      SHA256

      ec63d6c224e609176b69524c52ab8637ea488a096c509ee7ad27f5063001085f

      SHA512

      164f97935379e7f89dcf0e40bfeaadf9bd61eecebbb569d4d281b4bab3ade46e603c38404352e175f4f4f40e732d68829ce5d219b60a013f558e7d523dc5a296

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talismani.exe.com

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\kipZdSjlr\_Files\_Information.txt

      Filesize

      4KB

      MD5

      5f5093b32b81b27a7b5607f8cc3fe0d3

      SHA1

      33ddffe55db3a1e3e3baa1240435933811a97927

      SHA256

      a3d02ba5736918eeab21d6e33863b1114c41750596280046f5fd09bcc3beecff

      SHA512

      3ef84d98800cc2c3e8d964ae70e5fbc00f201e78c42067a8ce52c2260709b86cefba9acd7f85b48a41f8e5183fbd5a056b37710df2d75b004e6870740c7e01ad

    • C:\Users\Admin\AppData\Local\Temp\kipZdSjlr\_Files\_Screen_Desktop.jpeg

      Filesize

      53KB

      MD5

      3698b94a202d45d755b9ef125d81fc26

      SHA1

      f30128f167e50943d52195210de66a52fd0dc4ce

      SHA256

      16f5f6b5d8d047475d1a07651d7461ce8a02ef8980e0e04b76663a2b68cc12b1

      SHA512

      a9461b0077c0e9730d62a66f8b295cf1f611ed8815e6fd4055543a5e6d88325d5994b679e3de5090e174eb96e3df8f70d27b5d5abd53690c8ded8d2807fb634b

    • C:\Users\Admin\AppData\Local\Temp\kipZdSjlr\saGGSTfKpu.zip

      Filesize

      48KB

      MD5

      89fdb3bf50b412b041660240a1f3de43

      SHA1

      cf29e3d2f9dc4f665db51ea06da9628dc5ff8fec

      SHA256

      6fbb6e1b1b7ba26b11e2fc446499671744332fe240cad79ab7b4e4505f220fc5

      SHA512

      299b805cbe34567089cd30f6411cda691a58b3ab11bb9112836d02dbc73615a5bd3744b40700a69bca805db1d303f47325e5f6b513a783fa481666571a076798

    • memory/1340-21-0x0000000004690000-0x00000000046D9000-memory.dmp

      Filesize

      292KB

    • memory/1340-23-0x0000000004690000-0x00000000046D9000-memory.dmp

      Filesize

      292KB

    • memory/1340-24-0x0000000004690000-0x00000000046D9000-memory.dmp

      Filesize

      292KB

    • memory/1340-22-0x0000000004690000-0x00000000046D9000-memory.dmp

      Filesize

      292KB

    • memory/1340-20-0x0000000004690000-0x00000000046D9000-memory.dmp

      Filesize

      292KB

    • memory/1340-19-0x0000000004690000-0x00000000046D9000-memory.dmp

      Filesize

      292KB