Analysis

  • max time kernel
    25s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 23:40

General

  • Target

    JaffaCakes118_56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884.exe

  • Size

    727.6MB

  • MD5

    e8eafc4826f22001b09f5cee3e46e54e

  • SHA1

    e66b4001dc5fc5183a78253a649619b815a9c873

  • SHA256

    56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884

  • SHA512

    e08cf4e23eb3953ceb473f1175602d6ac3d7ab4677f44d971d0bedc7ca0c837acff523f9b78fe28b50d60ba3a9f39410fe4ac348410ddbd3b30d3d826ce02c3d

  • SSDEEP

    196608:mTdgDIK/MAVDXme7TshVez4GwrwTT19lGO5A/+:fP/JcWeruJ3

Malware Config

Extracted

Family

cryptbot

C2

http://kudxoq75.top/gate.php

Attributes
  • payload_url

    http://tamlar10.top/allude.dat

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\15BD.tmp

    Filesize

    176KB

    MD5

    fb850b9e65ecdd1f062ad42f492687b7

    SHA1

    07ca8d76586cd413494c28959da2108294979e8f

    SHA256

    d3f4d3e363db86f978b28f9cd3502cdbc433a96acd4010575af43353a79cc7cd

    SHA512

    fd6d5ae0e41f7521c6868a8106940ff97208ae3c3ffaf5677c6dc285c005fdd80a80bbbf8ab72ffa7e22cfb9bcaaa9422c4199c9e9bc0982be56714a6873299f

  • C:\Users\Admin\AppData\Local\Temp\FEF.tmp

    Filesize

    32B

    MD5

    bb24f67f4ea2f77504f99f47902a202f

    SHA1

    c816b5ab2a615f0a7e7e0eb418ec3af5d52d5ee8

    SHA256

    200d4cca68f25e0ece409d64ffa6cff329ea3df185b1e988f46e186f9716acd1

    SHA512

    f7835160c437d583ccfb113540d192034320551b45027bf227c13cb3ece57faa4e22bc79aa0bf3a541a0dd275cef0631c9ebd4f4e61befd6acac0a849141bbd9

  • memory/928-10-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/928-0-0x00000000004D1000-0x000000000082E000-memory.dmp

    Filesize

    3.4MB

  • memory/928-6-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/928-5-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/928-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/928-11-0x0000000000400000-0x0000000000B98000-memory.dmp

    Filesize

    7.6MB

  • memory/928-12-0x0000000000400000-0x0000000000B98000-memory.dmp

    Filesize

    7.6MB

  • memory/928-8-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/928-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/928-85-0x00000000004D1000-0x000000000082E000-memory.dmp

    Filesize

    3.4MB

  • memory/928-86-0x0000000000400000-0x0000000000B98000-memory.dmp

    Filesize

    7.6MB

  • memory/928-87-0x0000000000400000-0x0000000000B98000-memory.dmp

    Filesize

    7.6MB