Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe
-
Size
323KB
-
MD5
da9d92263969cf175f9d93419c82fd45
-
SHA1
4d0f60cdef36069c998c679ba9a7aeb466b8749b
-
SHA256
79e80765316a4a6ee52d62a373443e379ec1d341aaae5beab07c54307e75223b
-
SHA512
a47decf2a6a5a19aae7fa5edd2139dc621cf13107fea83a3300e6b67317a247b28646b0dc6135ab0c5bca5fe7d7e730c7dc203a87f5294423236bfa371c362a0
-
SSDEEP
6144:AeRKFeYBYmA3sLsGIWihb12eT8Jxcv7qZ3TNJnS5vFaVrGXYmIQGB/sOU6MUpt+:Aac/BYmAcIDTocjq9TNc59a9AYTB/Suu
Malware Config
Extracted
cryptbot
pacter42.top
mortiq04.top
-
payload_url
http://zukicv06.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2776 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2696 2644 da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2696 2644 da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2696 2644 da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2696 2644 da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2776 2696 cmd.exe 32 PID 2696 wrote to memory of 2776 2696 cmd.exe 32 PID 2696 wrote to memory of 2776 2696 cmd.exe 32 PID 2696 wrote to memory of 2776 2696 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\YZiqsvSWfmW & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2776
-
-