Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 16:55

General

  • Target

    da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe

  • Size

    323KB

  • MD5

    da9d92263969cf175f9d93419c82fd45

  • SHA1

    4d0f60cdef36069c998c679ba9a7aeb466b8749b

  • SHA256

    79e80765316a4a6ee52d62a373443e379ec1d341aaae5beab07c54307e75223b

  • SHA512

    a47decf2a6a5a19aae7fa5edd2139dc621cf13107fea83a3300e6b67317a247b28646b0dc6135ab0c5bca5fe7d7e730c7dc203a87f5294423236bfa371c362a0

  • SSDEEP

    6144:AeRKFeYBYmA3sLsGIWihb12eT8Jxcv7qZ3TNJnS5vFaVrGXYmIQGB/sOU6MUpt+:Aac/BYmAcIDTocjq9TNc59a9AYTB/Suu

Malware Config

Extracted

Family

cryptbot

C2

pacter42.top

mortiq04.top

Attributes
  • payload_url

    http://zukicv06.top/download.php?file=lv.exe

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jcyTdHrTPh\_Files\_Files\RemoveRevoke.txt

    Filesize

    533KB

    MD5

    a4a57bf1bafbc882ea55f61857247054

    SHA1

    ae75fa46a3e7f9389e752b4b2fc6ecd58fff94ca

    SHA256

    9227b2ea5d47926e4cb1f826a52e890d4097cb0193bae70ec69900dec85cb823

    SHA512

    d92e26e53915cdae6d09291ee351d06fcd9c711e88ad1af526aac4f511cfc3c0fa9f59f6f8143d302914af1786375711bbb2b006022f74c49c2937fe985008fa

  • C:\Users\Admin\AppData\Local\Temp\jcyTdHrTPh\_Files\_Information.txt

    Filesize

    3KB

    MD5

    328543d9bf04293067533e2f1ce20107

    SHA1

    0a08b117a19b0b31f57e758fcc49c8a9f9157681

    SHA256

    cd458576c3dee1e97f8a78b8c6932e1a6472137dbfb67928f25b055be4d419b9

    SHA512

    76085fbf0935f51d6935ce144460b92ce1d9e865b8cd7b9d40efde90370fd2f405efe7684fa337d1fe9c6cb6a3632564e8bf07e285130f56e0ec48145009e371

  • C:\Users\Admin\AppData\Local\Temp\jcyTdHrTPh\_Files\_Information.txt

    Filesize

    5KB

    MD5

    a1c56f3e744dd2672aedb3e8d1d21495

    SHA1

    cb328c899f775361925e870de7258677b0feb857

    SHA256

    845ba8750e6860fe5573d3849599c62d4e79e6a7fcca780c4d4e9af02f167c08

    SHA512

    3db6bccf9524c389e5cbbabd8f7c0b970d7b9fff9d61c08b85a34128c77806ccfd8637142a5d78627242aa76bcee7d6e4d2813688a9baf8b50e748639422c894

  • C:\Users\Admin\AppData\Local\Temp\jcyTdHrTPh\_Files\_Screen_Desktop.jpeg

    Filesize

    55KB

    MD5

    17da26fb33ab53275eb907532d02cd5b

    SHA1

    e457ceda80617f344e3c7a98a0e755b479703051

    SHA256

    02ea91ddc53186453f4f5e6657555a9dd3a64d8854f57e07acea9cd49d4ae478

    SHA512

    3ecb89cd70c93fdf02051498ff8f15a580212878d36bf1c60aedb56568573dd9cbf97e554c80293bc74599b6834be0087f1d8795189741c99d51831d6bff4efa

  • C:\Users\Admin\AppData\Local\Temp\jcyTdHrTPh\kaEUyXGGiA.zip

    Filesize

    583KB

    MD5

    b63ed7dd2f2afbdce8c13849daa3672a

    SHA1

    a814efc527f58d4fb1efbd6ad59bca19a1519a4a

    SHA256

    3632620b0bf66217369e451ea89c833dcbbee367fae67bd9c916592a1bdbe2bb

    SHA512

    5d074268e6fbc6fd3e50e7c725515e6d983ef42c8fd578925374177023f177fb0bfe26826f6eca752d3c80c3ffd7044e289f03bf08dc873a67f5ae89f35d838e

  • memory/880-138-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-160-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-122-0x0000000000B80000-0x0000000000C80000-memory.dmp

    Filesize

    1024KB

  • memory/880-125-0x0000000000950000-0x0000000000996000-memory.dmp

    Filesize

    280KB

  • memory/880-124-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-126-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/880-129-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-3-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/880-165-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-1-0x0000000000B80000-0x0000000000C80000-memory.dmp

    Filesize

    1024KB

  • memory/880-2-0x0000000000950000-0x0000000000996000-memory.dmp

    Filesize

    280KB

  • memory/880-142-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-145-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-148-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-151-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-153-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-156-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-135-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-162-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB

  • memory/880-132-0x0000000000400000-0x0000000000880000-memory.dmp

    Filesize

    4.5MB