Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe
-
Size
415KB
-
MD5
36ad25dda15ea5a29b5aa738f1e60bd9
-
SHA1
aaa36d292fb1a899116506006ccb2b207fda8a79
-
SHA256
a13eacd014b6b5032f0b2e0c18bf380f4f371b181e750e7d421870cb6c59aeff
-
SHA512
70290d735975d71dd9c2bdb01e2805efcb5f7cab81045d201ac1c00a165a8765d508719f0531f2a65ed545f7849997598d1ae455c385d07e6e109f725873b249
-
SSDEEP
12288:UPSzFKiNNuutzGGP9kYSy1wYJd3d8WPEkLS3C:UPS02ntyS9kI1r8WPE
Malware Config
Extracted
cryptbot
cemnba72.top
morvuy07.top
-
payload_url
http://bojpyv10.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_36ad25dda15ea5a29b5aa738f1e60bd9.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD594d9531322f271c4c312f1f9e834076e
SHA163b71c90b63603e319564af8032215735053d937
SHA2565bd4267858c9506b1811452e61f27c96b0e8af915c832f32a9c28fe776e9d79b
SHA51253f4c13c5f194664ea092035377e68cfaf91db3b17c16451c5b09ea512b1b521debfac6c2aec24016c77c92f87ce268be52155f3b770ec83315aeaf11810c233
-
Filesize
2KB
MD59edf9fcc38d010120d7a305a5f8d3919
SHA13a396f4c94e9a917285649239c4a542834e75ffd
SHA2564e54d3550966e2ca00aab942cf82d68ce95d82ea6786df71daadd94050555857
SHA512248b30ef224f188f815e48a72461b220bbaacb2fc7137d36d526e5bbfd7d54cbf3fbf43532bb57af26485edd96ed5620537400bf5f60816e6210cbabcaa4fcdf
-
Filesize
4KB
MD5e7b5bbfe65ea399de1b329fb7d83faa4
SHA173fb159cb9fdd7a5a42951a581de83852b7b42c1
SHA256e501841ca770261b1e9665fa70fe604527a403d15a7f62b39a229a29bd55d789
SHA51270f748601f03aac31b6817e43a2d655a26918e38af071fef4653679330d3c915b8788b626148226a88b0b009e7a94a7bf2ad40469bce4141832203237a958c4d
-
Filesize
58KB
MD50b4753df38bda063f1c4b187ded0278c
SHA17a10be35cc7c9dc41b990f7de8babe5d73ea7401
SHA256be10683a865dc4416232bba36d62f40cdc022db6b322e78c83719e7837c797f9
SHA512396a469983995a6f65ebe659af1e58f692ec668113424ad9aadfe8212ae13ab5f097d580c3dabb79c212fb7819032c1e675d55b813579ec37873d9151f3c4bb8
-
Filesize
52KB
MD5a3f82aba28ed84c183873d467bb70013
SHA178a68f574114a16b78ae841dcd7f6fb98d936722
SHA256f7f1d42dabd60d47ecf04376dabff7a593d7515cbdae992628374f12724ee942
SHA51201e0d630406f7fbab89c2c21ac8ac78f4dee40791ef1be05724b335b569cfc0bc7a774f9a430cf0142c13f7f4e8163753285e1b8b96611808edf8629da31147c