Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe
-
Size
323KB
-
MD5
da9d92263969cf175f9d93419c82fd45
-
SHA1
4d0f60cdef36069c998c679ba9a7aeb466b8749b
-
SHA256
79e80765316a4a6ee52d62a373443e379ec1d341aaae5beab07c54307e75223b
-
SHA512
a47decf2a6a5a19aae7fa5edd2139dc621cf13107fea83a3300e6b67317a247b28646b0dc6135ab0c5bca5fe7d7e730c7dc203a87f5294423236bfa371c362a0
-
SSDEEP
6144:AeRKFeYBYmA3sLsGIWihb12eT8Jxcv7qZ3TNJnS5vFaVrGXYmIQGB/sOU6MUpt+:Aac/BYmAcIDTocjq9TNc59a9AYTB/Suu
Malware Config
Extracted
cryptbot
pacter42.top
mortiq04.top
-
payload_url
http://zukicv06.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString da9d92263969cf175f9d93419c82fd45_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
533KB
MD5a4a57bf1bafbc882ea55f61857247054
SHA1ae75fa46a3e7f9389e752b4b2fc6ecd58fff94ca
SHA2569227b2ea5d47926e4cb1f826a52e890d4097cb0193bae70ec69900dec85cb823
SHA512d92e26e53915cdae6d09291ee351d06fcd9c711e88ad1af526aac4f511cfc3c0fa9f59f6f8143d302914af1786375711bbb2b006022f74c49c2937fe985008fa
-
Filesize
3KB
MD5328543d9bf04293067533e2f1ce20107
SHA10a08b117a19b0b31f57e758fcc49c8a9f9157681
SHA256cd458576c3dee1e97f8a78b8c6932e1a6472137dbfb67928f25b055be4d419b9
SHA51276085fbf0935f51d6935ce144460b92ce1d9e865b8cd7b9d40efde90370fd2f405efe7684fa337d1fe9c6cb6a3632564e8bf07e285130f56e0ec48145009e371
-
Filesize
5KB
MD5a1c56f3e744dd2672aedb3e8d1d21495
SHA1cb328c899f775361925e870de7258677b0feb857
SHA256845ba8750e6860fe5573d3849599c62d4e79e6a7fcca780c4d4e9af02f167c08
SHA5123db6bccf9524c389e5cbbabd8f7c0b970d7b9fff9d61c08b85a34128c77806ccfd8637142a5d78627242aa76bcee7d6e4d2813688a9baf8b50e748639422c894
-
Filesize
55KB
MD517da26fb33ab53275eb907532d02cd5b
SHA1e457ceda80617f344e3c7a98a0e755b479703051
SHA25602ea91ddc53186453f4f5e6657555a9dd3a64d8854f57e07acea9cd49d4ae478
SHA5123ecb89cd70c93fdf02051498ff8f15a580212878d36bf1c60aedb56568573dd9cbf97e554c80293bc74599b6834be0087f1d8795189741c99d51831d6bff4efa
-
Filesize
583KB
MD5b63ed7dd2f2afbdce8c13849daa3672a
SHA1a814efc527f58d4fb1efbd6ad59bca19a1519a4a
SHA2563632620b0bf66217369e451ea89c833dcbbee367fae67bd9c916592a1bdbe2bb
SHA5125d074268e6fbc6fd3e50e7c725515e6d983ef42c8fd578925374177023f177fb0bfe26826f6eca752d3c80c3ffd7044e289f03bf08dc873a67f5ae89f35d838e