Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe
-
Size
386KB
-
MD5
c316a19809d7a6407c7fcec296445375
-
SHA1
93babfad2f6bd39214c0eeecc18bc0ac9e0e9d70
-
SHA256
1341aa92c98b555b4ff1e1326b8dab052b4396526c659cbc43007b880643891d
-
SHA512
bacccdcf8cfb1891d948259cbae5b83477ce4e3602a50e7c1e1c29c713ab55b6705e0901146e61fec59c42b8d618ab33c338100f4fb190116f9d10e78a948028
-
SSDEEP
6144:XNj6TYWryIIt5z5nYiXu1t7+y/urZkw5FwthSHP+WeoOM6WdNU:XNj6TvOnq1t+ymlkw5FwIP+WeoOSN
Malware Config
Extracted
cryptbot
veobav12.top
morysl01.top
-
payload_url
http://tyngle01.top/download.php?file=lv.exe
Signatures
-
Deletes itself 1 IoCs
pid Process 1636 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3036 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1636 2196 c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1636 2196 c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1636 2196 c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1636 2196 c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe 28 PID 1636 wrote to memory of 3036 1636 cmd.exe 30 PID 1636 wrote to memory of 3036 1636 cmd.exe 30 PID 1636 wrote to memory of 3036 1636 cmd.exe 30 PID 1636 wrote to memory of 3036 1636 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\TwmtDXlU & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\c316a19809d7a6407c7fcec296445375_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:3036
-
-