Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe
-
Size
602KB
-
MD5
b9603bc9734cc8f5a19cea4c717970ab
-
SHA1
33675c412f39535a1e39c4d4d900ff5b224aed9e
-
SHA256
ee868c21339f7b0d6c1fcbe27769b583d3a17b11dc5f39862defef456a4a8df5
-
SHA512
25bc956decaada8d3d0ed1739644c56dc2f2272904334c6638b4e6fa0312eb58de474e46328059430e6e0b06788d87422dbf667ac22eed7e0dee836eadcffdff
-
SSDEEP
12288:3uBqDLOHBcaqQOftyYMRxFP0/6ySMyQlA/P5391ak5mT6iq3ekVhtG9C5Gxaq:iqD9aqQOLMrqXSwaHNGzZq3eko9H1
Malware Config
Extracted
cryptbot
lysvay12.top
moroer01.top
-
payload_url
http://damuxa01.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1260-2-0x0000000004AB0000-0x0000000004B50000-memory.dmp family_cryptbot behavioral2/memory/1260-3-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot behavioral2/memory/1260-220-0x0000000004AB0000-0x0000000004B50000-memory.dmp family_cryptbot behavioral2/memory/1260-219-0x0000000000400000-0x0000000002CCC000-memory.dmp family_cryptbot behavioral2/memory/1260-221-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot -
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exepid Process 1260 b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe 1260 b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9603bc9734cc8f5a19cea4c717970ab_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5f37715da4781ebddfdad0e21d20db0ca
SHA19d1bda29ad1eece2aeff489099184cb7db6aac81
SHA2564fd5067fd4ad44eac2051927e33ff7cf5d07d91ca617d8832b06222f7561aa88
SHA5126ffa3f6c0d8cde4c5ae4f20f44b3b4bca38c30fab92a9f2116aaaae7d2a6a4dbf7c00e799f85c4a3dc50887cb11acca6f2abbbe7d05ee498867c517102739f13
-
Filesize
1KB
MD52f28c4138b451508bdef829e2e36cae2
SHA11c93c2404820914352f8db0300549d7bd873046b
SHA25649e42275265e550b593f86c5950b7d8fc5f1020d6e37ceced24eb0b1246f37e5
SHA512245b85f106ddfe07d57536e81e74caabdf77c8cb5b1d5cdb27c423d6764e46a15891816bdc6c37dad112dbb66946a89561533d85ed7cdda9e9a50da45685f8e3
-
Filesize
1KB
MD5f37ad9d412287e21ed2db54a00df1186
SHA16585837252d9b59419451f81e884cbe963686646
SHA256de73492ecefa839bdc6772521309d03e746efd2b1fa12bc0b86f461cfd7ed710
SHA5129068da8d941d01498fd2e1851571dcd5277965395891c438e963f4458724408b110155646b06d9e2776f3852f006349b7f7bdb96f287faee8adc3f75806617a2
-
Filesize
5KB
MD53e76a403700508def47f7bad4679cfa5
SHA144d636e9f4a9728ce4e2e507077c23d6b92b32b3
SHA2566b9d688cec860e8111affbb3e47d13ad01021fd348e9e512ae190b7b42724e75
SHA51258d1128095f961f5369aa14b5df9e516331c2690ba83bf176e904d2210ed721175edbf0b44f0221a99a339164a48898ea7cd1932a4c7780e9cadf8f792c5929f
-
Filesize
48KB
MD5104eb8ba21e19ec0c1241675a5382222
SHA1c7cab5b09573f4435cb2e195b2c4dd28a35a312b
SHA256e50e4b83805b51a53934c564dcd44a06af201a91297a98c5aac3a9d33ea1b1d0
SHA5129fc592e14b0ef497c8ec6bcff093a0375370dc916e3d263a2d452c9bbb7812f07862e86d3d001572ad268eb0874bd99a2f90cf680fc9d9925e8dffaf3d7973a3
-
Filesize
1KB
MD53cdf5653b355b9f3ea23bb2e254b7fd2
SHA14ed6ca417b75563cfbe9ae028a687a4d67073562
SHA2566f3441011cba13eef5c078efe566ce07477859a6c143b29ea9a3fda97c3fb4b9
SHA512574020a2678e9854e100cb72a424470eb69d453285ae31f268369f48f60211170a6d066a1b36b995ef8765b6351d9e66b5ad27c5313e28a457fa98cb21dc9fc6
-
Filesize
7KB
MD55ba6b209a2211a632f8d34ed039ed522
SHA158877b5aa9af4f859cef3e750fc8ef42b9c12b22
SHA256c564dc7ee26c0b964bf27001be9b37c069d32d848eead0c4714ccd62abac482e
SHA512481aa024c8e1c5f054748badc0044b469aa681363a7e7bf29fba464745ac21106047d541039b7eeb7733c6794b2330ddd816e592d404880f47c4a9e2dc9875f7
-
Filesize
43KB
MD588783c3117ff00f7a1ce2332ba763284
SHA1f9c4da2b1206f02c861582d8b9c0e7d586c34d13
SHA256cd2f8ec8ba2ffffd7cd8bb3d8f060ac1aa247b8666891da18e3b38a03f4b39b7
SHA5121b237216bf6be41fc938ecc4684c2ad54410be6ce263ea86205753b10984a1ea8b41ee8b52a5b8a37143fb359678f81c310faed725c1f48836b57652f24c86b1