Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe
-
Size
327KB
-
MD5
4b88ea5840bc2a0e537751c2a3bc7087
-
SHA1
78888607d7ad9e4a21c4791f6428eda04daaf3b7
-
SHA256
ac6ec77a1444f5de3ab2e46fe7757e0c68111c75b7170c1fc87343e46a78d939
-
SHA512
bdd6b45f217d36e25da051442c24d92ff15a81b20ab40b9768c14f957995f1c613f64c991a950f7ada6057c67aea08e264cb5c94353f241f27dc66a915422699
-
SSDEEP
6144:dzeDa4vT2lsqGEPPGzOcOvOIy661R/yAz/odS/jPBVTh7RXda:dzeDa4ClsHzZMy31hHL/3NR
Malware Config
Extracted
cryptbot
pacbry45.top
mortiq04.top
-
payload_url
http://zukicv06.top/download.php?file=lv.exe
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4b88ea5840bc2a0e537751c2a3bc7087_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568c32297f6ee5c83b795ee6845cb0d9f
SHA1a808108147c608889b3d018f33c8dc16b732a412
SHA2564b8a4d6143750df68b4a7a85daf7b704d059061b95ba8de2745fef1f1ea2b853
SHA512a4b93c412eefc2974ec2c9ccab57493aec1ddf0dcd1972cdeb24458d80dcf515717920f7fe7e0884130585b69dc659dd0bed11ab2f807c68596fde17f413d3b1
-
Filesize
5KB
MD54b484a75a5d005eef187970682ed2ef6
SHA11ffd59bce72d33bf1f36dfab8f07f1ca707d1a96
SHA25603f213713045e3e2df2bf25db66a151e7cb60b5dbd0ab6cbfbb36f2c71f82fe3
SHA5123a9b8ba60ab5097ae61a557303ebbc878a60715f3683202427a76385820dca54746fcd464decf826199e915e92f18d9d8dfc739a70e23a5b8cadb5700ec872e7
-
Filesize
54KB
MD5174dddad3db67eed339164267abb0e7d
SHA1e0cc5998e543750db15113470ba04061c343537b
SHA256c9e678157b9dd5425379f98d25dc8e405cf324197a25cf5a5babfd9ef6a3ab67
SHA512f1ab842d70b2dd01391ab2b32443e32effba7b42361a8d46d275b5cf5b2148099f814e7537c87b890253f25ddb493ff57c89370afc9d85805c84e37b86504dc4
-
Filesize
49KB
MD51963509b07b5531ce0762b708c4a46b1
SHA1c9cf59b7e58cd908bd0de165b8c7c50f7d8e08f6
SHA256775144951148c75a461db56450383cffd39bf473fec108a195e1dcaab9c93af8
SHA512bec9df39982dce88aeb9f3e392949af92683124a4065ba8feeaaeb992f9a72552e8c521ab06bdceb5379008d7d1bac79b4a210a4136909fd4603b0902f71b11e