Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 23:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe
-
Size
346KB
-
MD5
7ebbb54dd8b2cc5aea696b2ad88abdbc
-
SHA1
b1ae8ad0ff5ba202b5783d951be5d4aee2e92600
-
SHA256
4ea07b9988b03173d35240bd56cfe6b16b6f5721c62d16129c9d974bbab92d04
-
SHA512
603c898492ea2ec7e0a4271d02ba1c0afd38a7abe9e8bcf1d1747dcc705530bca1537d5e16a3b06af5170c9ce17c0c5a417fbc8679529994bb92419b2fce53e7
-
SSDEEP
6144:6o6QtEG7DLMyJ6NhhGgIEX9noRJg7AcgtVjiIADG8el:6RQtE8LNJ+nHjFoY7SjixD
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 3032 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2436 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3032 3028 JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe 30 PID 3028 wrote to memory of 3032 3028 JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe 30 PID 3028 wrote to memory of 3032 3028 JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe 30 PID 3028 wrote to memory of 3032 3028 JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe 30 PID 3032 wrote to memory of 2436 3032 cmd.exe 32 PID 3032 wrote to memory of 2436 3032 cmd.exe 32 PID 3032 wrote to memory of 2436 3032 cmd.exe 32 PID 3032 wrote to memory of 2436 3032 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rMPDiDdwCJVd & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2436
-
-