Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe
-
Size
675KB
-
MD5
f295b6024d248163f14b87bc6aed9db5
-
SHA1
b16d00942ca755d99f061ec63411c5cdd521f64c
-
SHA256
03f1f8cb65e89c21c87f0e04c65dace4d48c708dd175056e581516bd94c50bfa
-
SHA512
c52252e801997ae01487cb57e3eec2b2b92303a49fceba676fd746c5c2e6d8c6fc8d60c25f7de07794893c0d43ebcc6b786eea68188df222e980df8542a49063
-
SSDEEP
12288:JmfR9Cu6Hml1T4pOJK6DzMJKtB61OPu7faLc5kSEkwVgyo22tDtuejoWXNj0p6Pj:YCu6Hmz456fMJI8O4hY+yoltDwetKp6
Malware Config
Extracted
cryptbot
ewaqly46.top
morjau04.top
-
payload_url
http://winhaf05.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral1/memory/2972-3-0x0000000000310000-0x00000000003B0000-memory.dmp family_cryptbot behavioral1/memory/2972-2-0x0000000000400000-0x00000000032A4000-memory.dmp family_cryptbot behavioral1/memory/2972-222-0x0000000000400000-0x00000000032A4000-memory.dmp family_cryptbot -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2972 f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe 2972 f295b6024d248163f14b87bc6aed9db5_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5efaf39c84327ca0f1b7fbc30f98ece17
SHA1736e21f7f73a55d2e05d5820924cecbe5156c2b6
SHA256be98d5da036d3f5e1267adf6ddc82df36ff2436265b33bb3d8e1293ce1c8f0b8
SHA5124e2bd1fa3abd7c4589eb4aac20f81a4f5104ee0712611601ad1ac71e243615de7584b010617e731ae2f788ea19c112aec948e4d00cbf1e1f7a9c6c1d6fb895be
-
Filesize
1KB
MD547ee851f087e23b9f39c8c2c7593df0f
SHA18f8314f101f035f4c86f2b7e0c5b09ae16af5efa
SHA2561c62de91906d4f80b4836da0c06a55018e5918d1bbd251eaffabe5c268399d79
SHA512ef88cea95227d7ef0ef4171847dd54320990e9ed8dad991aaf803857cad2cd6728becde6d29cb7ced4e1506b040fd962b504e6cca863cab756336c43499b2961
-
Filesize
3KB
MD565ee2a93acb635fa4d1b77f873dacff0
SHA1f931ea21fbb619b05f2dac29702ce89b13951a33
SHA2565afbc3b7bc3922fabc3d2a4d458b18709964c2da5bfe11b7febee7eba20c1cdb
SHA512f169e8bb953415072f010dc9e1fe064fb465634d72f4197f87894907a7ac7ba697be3ae8929d40c6dffef50378e8de8d394f1cbda87632d57c88d946deb1f528
-
Filesize
3KB
MD5300e570782acd9574caba7b5d91edfbb
SHA19dcd16404dc491ab0840a64e7cc893cd9817100f
SHA2562b8b0d44fe68515a1e1fbc180a824115e8c0b41003c52131be28a9eff792a2f1
SHA512e87f7b866bf87b86838dc4880e00982eeb1ad8b8e1322040f5515d91ecce5358f5145421b682a027cfb67cd3d6980b7b75421ec8d425fb7a2d1267774cc1e088
-
Filesize
4KB
MD5a1158b5f7511bc9edd741944da5d6c48
SHA190e7d5d59429cd85256d815e7269e05fd478f6cb
SHA256f1de8928daadb56a0298c69f666a91f773c7bdfc7243aa06efd67b7e28157d14
SHA512127ae7178d58966ad0f0942bbb121354db5ac9b7644f3e3c6525779ca2113d64c60f87d0683a60bd980733b68b16c3ab9bbf83c7d1e0d26b5712b76181b6d2c6
-
Filesize
37KB
MD517cf069692f8b4089cba58c7272d1616
SHA1baf84dd07239577102785f9514f5255eb92c7948
SHA256c1ea7d124851206f42d3c10f3a4f59f46a1fa2e1ec06fe72ef46385915c5dcc5
SHA512084de704f889734b113500ec0ebfdc16b1d1ddd6110deb52359a64962a2844c0e12709af9b189dfb1d07c0cbd4ddb80333c6ef8357a274b3ce34dc267f8ee896
-
Filesize
1KB
MD5bfba08859c2b5cb30d559e3d9fa539ef
SHA1c59359959683bb44aeb6a6886e194d5f9dbc7d20
SHA256606cef2b76be0fb86b52139260f10b8f8062981b82b0b54ca13722a947e1a72e
SHA512b7b3b49b05b768f3aeebb91567db0d82a1102a2e142ea64d9881b0d48029324ea1d2910d389c6df44f0d4e10026b4094852025cb0e89820db470f5f8a470d85b
-
Filesize
3KB
MD589db5c84d8eb3ebc0b4b8be019b7c971
SHA105fda31ad0f419b021037f4eb786a0454deee150
SHA2569d92a5db67f46b3835d84ff989558ce9c1675a4b8ac96fef33bab0a4dfa22bb5
SHA512f4317c7485768d7a74bc50a40aa31aa906448d38139d4704f8bc705218bc51972988703c3e56e3593a229258d285d4df5001dc6a1c6a7d0a9a978a5c3cc628bf
-
Filesize
3KB
MD5634d808efe011f573eef615c0226497d
SHA148387e74bf43f1714ef8f349faf12f91d179671f
SHA256c0a3dd88cc93b36d8fedd97010ee3b0697eabb05a525a9f8e097a715544372dd
SHA512a99dd2864fc75fe75f7674aed2108f14b6e3e5e2ef3e9f8e39b63f3ddef36074e6194f794dda54f7ab6e3494567f60fc884109f3fdd83ba046fc57e60a6e864f
-
Filesize
4KB
MD5cf00e87805ad6691394324bf13da5020
SHA1cb12351d5bcf7cf42712e6a07ac6ca48fefe380f
SHA2565e8b816db0dc86cdb2bcf6fc286520c8e618991ed6cd1fd380290fa1d40b292c
SHA512b9dfbf0fb0cb049d92b00589a921070d306ee8f25ba55640abbd143fc67db1976be35dd901c5f671744acb28e8f3e7ffc31138e49ec3af0109e8a4b2d68f5123