Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
a46fac3fce10d95d76cca57a9736a868
-
SHA1
5f18417206dd1734c9216f4b58ad547eacaae847
-
SHA256
d3b3bb2152cc272693f174af8209b0e41388e619e6ee0dbceb2d796153dc9c5b
-
SHA512
b97f46fdf6e8ae3d84cc6c844a8eb5217385c3ddd3ad5d2ebfd5f41cdcb8cf41870129b285396ca24ee97ed204baca08640df3594f3fa22ab5a7ed6bf2e196c6
-
SSDEEP
24576:6g8oV3LeiyZ2oS8iUxhhhCNToGSkLyObxPPnMHhqb6i9OVs:L36corSNPSkLNbNnWIb6js
Malware Config
Signatures
-
CryptBot payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5072-24-0x0000000004AA0000-0x0000000004B43000-memory.dmp family_cryptbot behavioral2/memory/5072-25-0x0000000004AA0000-0x0000000004B43000-memory.dmp family_cryptbot behavioral2/memory/5072-26-0x0000000004AA0000-0x0000000004B43000-memory.dmp family_cryptbot -
Cryptbot family
-
Executes dropped EXE 2 IoCs
Processes:
Usci.exe.comUsci.exe.compid Process 1748 Usci.exe.com 5072 Usci.exe.com -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
findstr.exePING.EXEUsci.exe.comUsci.exe.coma46fac3fce10d95d76cca57a9736a868_JaffaCakes118.execmd.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Usci.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Usci.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Usci.exe.comdescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Usci.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Usci.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
Usci.exe.comUsci.exe.compid Process 1748 Usci.exe.com 1748 Usci.exe.com 1748 Usci.exe.com 5072 Usci.exe.com 5072 Usci.exe.com 5072 Usci.exe.com 5072 Usci.exe.com 5072 Usci.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Usci.exe.comUsci.exe.compid Process 1748 Usci.exe.com 1748 Usci.exe.com 1748 Usci.exe.com 5072 Usci.exe.com 5072 Usci.exe.com 5072 Usci.exe.com -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.execmd.execmd.exeUsci.exe.comdescription pid Process procid_target PID 4836 wrote to memory of 3840 4836 a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe 83 PID 4836 wrote to memory of 3840 4836 a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe 83 PID 4836 wrote to memory of 3840 4836 a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe 83 PID 4836 wrote to memory of 1780 4836 a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe 84 PID 4836 wrote to memory of 1780 4836 a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe 84 PID 4836 wrote to memory of 1780 4836 a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe 84 PID 1780 wrote to memory of 1584 1780 cmd.exe 86 PID 1780 wrote to memory of 1584 1780 cmd.exe 86 PID 1780 wrote to memory of 1584 1780 cmd.exe 86 PID 1584 wrote to memory of 4032 1584 cmd.exe 87 PID 1584 wrote to memory of 4032 1584 cmd.exe 87 PID 1584 wrote to memory of 4032 1584 cmd.exe 87 PID 1584 wrote to memory of 1748 1584 cmd.exe 88 PID 1584 wrote to memory of 1748 1584 cmd.exe 88 PID 1584 wrote to memory of 1748 1584 cmd.exe 88 PID 1584 wrote to memory of 768 1584 cmd.exe 89 PID 1584 wrote to memory of 768 1584 cmd.exe 89 PID 1584 wrote to memory of 768 1584 cmd.exe 89 PID 1748 wrote to memory of 5072 1748 Usci.exe.com 90 PID 1748 wrote to memory of 5072 1748 Usci.exe.com 90 PID 1748 wrote to memory of 5072 1748 Usci.exe.com 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a46fac3fce10d95d76cca57a9736a868_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵PID:3840
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Turbamento.aifc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^JELfaxXqaAFUmUATRIcZuUapRVyOrkOsikNinQFIMVJZbuJNkRMCIJxPkCnvfpXiMhNhiacqeMhklzMKksCknkJnRXVVaozDXChpzvGScLmVcoESQNkY$" Ombra.aifc4⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Usci.exe.comUsci.exe.com I4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Usci.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Usci.exe.com I5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5072
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 304⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD5d264b6e27748733930592bff42ce935d
SHA11385ad7855a5c804f3822e28883adea0c51e123c
SHA25610c83d6f9565adbea8040c424887cce1a19e981c9e55fdaf26b4c9bebbb4a198
SHA512093c4dab47f3a50b395f88b8e594a0e889cea8d384352ce96e0cf5e407091275b1e1b081ad0f740c3702e50f76a2025fad827473c2b287f534db6cf0e8448ea1
-
Filesize
872KB
MD5608ba61cbaf75e1c6258480f87ceb5c1
SHA189ac0c42b71d6af7b9c382fc3cfc71941dbb28cd
SHA2568af4505d71423c4abd175dcf81fcc5566e4db03a4cfd6f3c0f8e6c8415e56e03
SHA512dcbca3d1bb477cc53ba541053e4eb16f4ce3fad14091c700a843328786e0ff7ae956c05d6d886c8b8f1ccfab21923170b9117b3284256c4a632d7895ae21bc36
-
Filesize
634KB
MD59c90955c037667a1d6a98d52549c8031
SHA1bfcbd11ef17be08426ff6c51f153ee449395d5bc
SHA256dd5d31cfe88fd77fe8646b19a6b2f348fa5ce10e1febaca0d7bfc457964d7301
SHA51272093264611efbfaccaa9a2133bf2174dc1de19873932d047be769442bd36d474edf64fdb8c9ec2073ed40e4a75166c9be39771811b41c7ad6ea7fbe4a2eabaa
-
Filesize
548B
MD5b5dcccb8491bad9b5313904cd56c95c8
SHA1d2662d98013ccf8927c8e748009fd431c4bf1229
SHA256f083338d4124496e820fd063cfa10274300be77ccc7ec6a9f26032d5cfae7cdc
SHA512d9cb2b33f2eab343b29c1a372e81b3c416016db9a622e59dfe4e98df232afc69821468ffd2a62500b1bcc61b26d6a8c3a571ce66304e91f27831dbf29b8a29c8
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
4KB
MD568091992f551bc3023e4e85eae368371
SHA126385b05bfc1f964f5abd8713d5f4df4d8dcad37
SHA256b205707c3e6281ad508cdf1f7bbc520c4a3656536a13e418c5d1f1c23bfcff2d
SHA512d5a03ef6c23c8ae3b040b66c7086468ebdd0f1050a39134690084c88deae2841cb8d81c0605bbb550171803e416d82d1cf6481aab9d515c1209493c027558370
-
Filesize
48KB
MD5994dddd97df58eb2449e6ae4b1be6f28
SHA124fdc8598acd37f31034fba1f0736501dfd69989
SHA25657a9f193b310090e12122df90b5738ce12da1ee59b2b37ad40f8647071c8a3fa
SHA5126068d3352c7c03c23c0e5dd8e515d3b0c8d5aa0980141ba91bfce1e7cc7266e0216312cb3aa0240fb9c84b38953c1847160d83b0dd5bfb9f9fa04456e90db9a3
-
Filesize
692B
MD54f4b2b587dfbfb98af80d70833b3dc10
SHA171594790452c38a31298e8cdc1a996e7d16fa6f6
SHA2566dec55b6cbf471d228b32d0c941ce023e1572f7bd39fb01336153303b31736ca
SHA51295b5edfb3f61982ca2df1d80f7d408530e8c36efa6b9c31bb06b2f4f56e6b4e59967e1ed9f73e7745edae6026ce8c18c174c8e59f53b688593db350f0a695809
-
Filesize
7KB
MD58e00b18627a93edcb34bd541d1a08829
SHA1cb67252f401cb5e798ddb278838442f925a3edd8
SHA256fc6e3e13fefd11501f6e2e7c3aa338d570d3667339ecd7825fde980f5c3ce3f3
SHA5124a3e09dd57e34c27253df8d4f7f2217258ff20754f7a0809cd76b22857855aaf621b324526c05e50f5e856f809fb15bd8f3a055f28d8313bb92f1038d7c3fa7c
-
Filesize
43KB
MD525a845131621544e4434669f50ae2856
SHA1dc374ab5696958c59f6d26f0c9f3902fdbf22712
SHA2566c03ee6689094b54b62e421577a1ec6e9941df617c99a15c777ce7b0337b6c57
SHA51279583a24f12737143217d3182e706322e68fc201114a51b61f350f0e4f48d09b9e727545c8b3b42d8a5b32b6d1d2df6098944518de325fbf189f81c8a83d85d5