Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe
-
Size
964KB
-
MD5
ac1eec7ed21f24d15b47eeb754f40ebe
-
SHA1
4ddfcf906a754c96d92c63dfc8fbf65bac8271fe
-
SHA256
501c0162355dee7aef140c1d26e3424e4e3fce34fca4776fb74f89e450c726e8
-
SHA512
dbb1bc5a028651eb567f5f9b5635f37fd02efa8aa8548ed2f21a3b03e73534ab7ad16bea67eea71bb2636f238fb74497401d8aaeba82545acfb0425cfaff7777
-
SSDEEP
24576:ZwiC/zGeGGIJk6u2Ir7Y/qV4BsjPsW0IYTIH9ASRrn:ZwicIJ8Q/daTsCYTw
Malware Config
Signatures
-
Cryptbot family
-
Executes dropped EXE 2 IoCs
pid Process 2124 Suoi.exe.com 2868 Suoi.exe.com -
Loads dropped DLL 2 IoCs
pid Process 2108 cmd.exe 2124 Suoi.exe.com -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Suoi.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Suoi.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2772 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Suoi.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Suoi.exe.com -
Delays execution with timeout.exe 1 IoCs
pid Process 2644 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2772 PING.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2124 Suoi.exe.com 2124 Suoi.exe.com 2124 Suoi.exe.com 2868 Suoi.exe.com 2868 Suoi.exe.com 2868 Suoi.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2124 Suoi.exe.com 2124 Suoi.exe.com 2124 Suoi.exe.com 2868 Suoi.exe.com 2868 Suoi.exe.com 2868 Suoi.exe.com -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2576 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2576 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2576 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2576 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2084 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 31 PID 2404 wrote to memory of 2084 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 31 PID 2404 wrote to memory of 2084 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 31 PID 2404 wrote to memory of 2084 2404 ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2108 2084 cmd.exe 33 PID 2084 wrote to memory of 2108 2084 cmd.exe 33 PID 2084 wrote to memory of 2108 2084 cmd.exe 33 PID 2084 wrote to memory of 2108 2084 cmd.exe 33 PID 2108 wrote to memory of 2240 2108 cmd.exe 34 PID 2108 wrote to memory of 2240 2108 cmd.exe 34 PID 2108 wrote to memory of 2240 2108 cmd.exe 34 PID 2108 wrote to memory of 2240 2108 cmd.exe 34 PID 2108 wrote to memory of 2124 2108 cmd.exe 35 PID 2108 wrote to memory of 2124 2108 cmd.exe 35 PID 2108 wrote to memory of 2124 2108 cmd.exe 35 PID 2108 wrote to memory of 2124 2108 cmd.exe 35 PID 2108 wrote to memory of 2772 2108 cmd.exe 36 PID 2108 wrote to memory of 2772 2108 cmd.exe 36 PID 2108 wrote to memory of 2772 2108 cmd.exe 36 PID 2108 wrote to memory of 2772 2108 cmd.exe 36 PID 2124 wrote to memory of 2868 2124 Suoi.exe.com 37 PID 2124 wrote to memory of 2868 2124 Suoi.exe.com 37 PID 2124 wrote to memory of 2868 2124 Suoi.exe.com 37 PID 2124 wrote to memory of 2868 2124 Suoi.exe.com 37 PID 2868 wrote to memory of 2824 2868 Suoi.exe.com 39 PID 2868 wrote to memory of 2824 2868 Suoi.exe.com 39 PID 2868 wrote to memory of 2824 2868 Suoi.exe.com 39 PID 2868 wrote to memory of 2824 2868 Suoi.exe.com 39 PID 2824 wrote to memory of 2644 2824 cmd.exe 41 PID 2824 wrote to memory of 2644 2824 cmd.exe 41 PID 2824 wrote to memory of 2644 2824 cmd.exe 41 PID 2824 wrote to memory of 2644 2824 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac1eec7ed21f24d15b47eeb754f40ebe_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Ricordate.vsdm2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^QWHLUKuiiDFIhiRyCPjdFJNtltqqpnGWMhmyxpaEILzHfdHrBCugXdnupCAQJyYJWIWqHMLavIIUfyPTvXmHa$" Illusione.vsdm4⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Suoi.exe.comSuoi.exe.com V4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Suoi.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Suoi.exe.com V5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\tKQstyUwFr & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Suoi.exe.com"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\timeout.exetimeout 47⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2644
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5109f787615bbe467bc1e4fe223c64cd5
SHA1ce3aacc8542a180c49f81910c67bdd410f1a9aa5
SHA256e73d322be366b7d0ef65f202fce5744a2bb66e7dfeb4845c75612c064a2dfb45
SHA5122409e35db56292fcb511d366cfa0bc8c27aa46f9c44562be76cbbb9d74bc4a1f9fe1117a5baa2927b47eedf3dbfb7b2af6f95cf663e92b4e51a9fed7216b0d9d
-
Filesize
369B
MD5fde57daa71c28252665c4b580ff34c5c
SHA1499743b480a84e323da62545b15c37d5b40af210
SHA256bd21fc1f1de4e42951bebd3df3605fb59791934916b48334b79076b331803b25
SHA5125af3f7056fd234f6806202da8d829841c6d6ffe023c003d2e97ed731b730d0b71c064c159a4a8f3106f31840167d9829c346ede593cd8945c20ebaf0a645a426
-
Filesize
1.1MB
MD5ebd410b00fb7f35dd4085899c639aead
SHA1f02331585123a2c0cd6c636912281d6657b8e58c
SHA256fb8fd58158d33e6f1781fef18f0c15657db81ee3d9b177ef816720cbd797f214
SHA512fe4c195c3df38f2cae2b033696dd9e72bc4af6230002d3f9ea3cf31a593a3c6d3c944704d432c7c2744c77c4fb48f36da6a09e0aa4a3e8c609481cd0e853d8dc
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c