Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe
-
Size
327KB
-
MD5
4b88ea5840bc2a0e537751c2a3bc7087
-
SHA1
78888607d7ad9e4a21c4791f6428eda04daaf3b7
-
SHA256
ac6ec77a1444f5de3ab2e46fe7757e0c68111c75b7170c1fc87343e46a78d939
-
SHA512
bdd6b45f217d36e25da051442c24d92ff15a81b20ab40b9768c14f957995f1c613f64c991a950f7ada6057c67aea08e264cb5c94353f241f27dc66a915422699
-
SSDEEP
6144:dzeDa4vT2lsqGEPPGzOcOvOIy661R/yAz/odS/jPBVTh7RXda:dzeDa4ClsHzZMy31hHL/3NR
Malware Config
Extracted
cryptbot
pacbry45.top
mortiq04.top
-
payload_url
http://zukicv06.top/download.php?file=lv.exe
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2840 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2792 2880 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2792 2880 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2792 2880 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2792 2880 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2840 2792 cmd.exe 32 PID 2792 wrote to memory of 2840 2792 cmd.exe 32 PID 2792 wrote to memory of 2840 2792 cmd.exe 32 PID 2792 wrote to memory of 2840 2792 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\oWrhXSVfbgXPP & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2840
-
-