Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe
-
Size
415KB
-
MD5
36ad25dda15ea5a29b5aa738f1e60bd9
-
SHA1
aaa36d292fb1a899116506006ccb2b207fda8a79
-
SHA256
a13eacd014b6b5032f0b2e0c18bf380f4f371b181e750e7d421870cb6c59aeff
-
SHA512
70290d735975d71dd9c2bdb01e2805efcb5f7cab81045d201ac1c00a165a8765d508719f0531f2a65ed545f7849997598d1ae455c385d07e6e109f725873b249
-
SSDEEP
12288:UPSzFKiNNuutzGGP9kYSy1wYJd3d8WPEkLS3C:UPS02ntyS9kI1r8WPE
Malware Config
Extracted
cryptbot
cemnba72.top
morvuy07.top
-
payload_url
http://bojpyv10.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 1480 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2980 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1480 2596 JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe 29 PID 2596 wrote to memory of 1480 2596 JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe 29 PID 2596 wrote to memory of 1480 2596 JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe 29 PID 2596 wrote to memory of 1480 2596 JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe 29 PID 1480 wrote to memory of 2980 1480 cmd.exe 31 PID 1480 wrote to memory of 2980 1480 cmd.exe 31 PID 1480 wrote to memory of 2980 1480 cmd.exe 31 PID 1480 wrote to memory of 2980 1480 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\YNPbrkhBOaPG & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2980
-
-