Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 13:38
Behavioral task
behavioral1
Sample
JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe
-
Size
2.7MB
-
MD5
26a7c7a28f1ea65bf7b51351e2c6eb67
-
SHA1
77f410701c760731a468ae0ba3e9175aaed76299
-
SHA256
084f757c11631c23d9fc366f99f622496923703ed552b53744e98de635ac9547
-
SHA512
649ca3f6f7f4a501abac5b42e4f166737ef3cb8373129cda246d591aa93c7590ae715acdf0b8e523a87c3e30052d7f6941aac7ad92c787e4dad808ce07045cf5
-
SSDEEP
49152:+IDeFTdTS1H2BKeMN7XxztRZSJTe5XlYMjrDXg0s3p3cA/i+IXOXpVBip5yUCDR9:py+1u+ztHp+yrDw0u+ArI+ti3yUCtyPk
Malware Config
Extracted
cryptbot
veogka41.top
moruhx04.top
-
payload_url
http://tynauk05.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe -
Deletes itself 1 IoCs
pid Process 2428 cmd.exe -
resource yara_rule behavioral1/memory/1048-0-0x0000000000DF0000-0x00000000014D8000-memory.dmp themida behavioral1/memory/1048-2-0x0000000000DF0000-0x00000000014D8000-memory.dmp themida behavioral1/memory/1048-5-0x0000000000DF0000-0x00000000014D8000-memory.dmp themida behavioral1/memory/1048-6-0x0000000000DF0000-0x00000000014D8000-memory.dmp themida behavioral1/memory/1048-4-0x0000000000DF0000-0x00000000014D8000-memory.dmp themida behavioral1/memory/1048-3-0x0000000000DF0000-0x00000000014D8000-memory.dmp themida behavioral1/memory/1048-7-0x0000000000DF0000-0x00000000014D8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1048 JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2548 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1048 JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2428 1048 JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe 30 PID 1048 wrote to memory of 2428 1048 JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe 30 PID 1048 wrote to memory of 2428 1048 JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe 30 PID 1048 wrote to memory of 2428 1048 JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe 30 PID 2428 wrote to memory of 2548 2428 cmd.exe 32 PID 2428 wrote to memory of 2548 2428 cmd.exe 32 PID 2428 wrote to memory of 2548 2428 cmd.exe 32 PID 2428 wrote to memory of 2548 2428 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\ToHZIsTH & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_26a7c7a28f1ea65bf7b51351e2c6eb67.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2548
-
-