Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 17:26
Behavioral task
behavioral1
Sample
JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe
-
Size
2.9MB
-
MD5
30a80093ffdd77cb26f2c7558846d5b0
-
SHA1
8dd5e4b51d88e550033377ce26de0e136ee45a4e
-
SHA256
381d92bbafee8c7a8e7b42ce2904812e5f652295eac97a262d7f1ad223eb5168
-
SHA512
f152a76ea4d264b8a184ef9e741e413bef8f219a5f3e38f3be425b168b448fb264f86ff6f99eb766baec03053abb093e7f574983c14ab1d0b2baf76e28b1c69f
-
SSDEEP
49152:D3+/DXxsNB1IS37mzt90YuKYJz1ZYHN5qIE8EBveV5dnVfp3HzI6+75BjvoujHp0:bvBJ37mx98RJot5bEBvK5JVNB+75BjvO
Malware Config
Extracted
cryptbot
veongt57.top
mornoi05.top
-
payload_url
http://tynqes07.top/download.php?file=zwoag.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe -
Deletes itself 1 IoCs
pid Process 2476 cmd.exe -
resource yara_rule behavioral1/memory/2340-0-0x0000000000340000-0x0000000000A91000-memory.dmp themida behavioral1/memory/2340-2-0x0000000000340000-0x0000000000A91000-memory.dmp themida behavioral1/memory/2340-3-0x0000000000340000-0x0000000000A91000-memory.dmp themida behavioral1/memory/2340-4-0x0000000000340000-0x0000000000A91000-memory.dmp themida behavioral1/memory/2340-5-0x0000000000340000-0x0000000000A91000-memory.dmp themida behavioral1/memory/2340-7-0x0000000000340000-0x0000000000A91000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2340 JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1936 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2340 JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2476 2340 JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe 30 PID 2340 wrote to memory of 2476 2340 JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe 30 PID 2340 wrote to memory of 2476 2340 JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe 30 PID 2340 wrote to memory of 2476 2340 JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe 30 PID 2476 wrote to memory of 1936 2476 cmd.exe 32 PID 2476 wrote to memory of 1936 2476 cmd.exe 32 PID 2476 wrote to memory of 1936 2476 cmd.exe 32 PID 2476 wrote to memory of 1936 2476 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\nXUnfnSX & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1936
-
-