Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 23:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe
-
Size
346KB
-
MD5
7ebbb54dd8b2cc5aea696b2ad88abdbc
-
SHA1
b1ae8ad0ff5ba202b5783d951be5d4aee2e92600
-
SHA256
4ea07b9988b03173d35240bd56cfe6b16b6f5721c62d16129c9d974bbab92d04
-
SHA512
603c898492ea2ec7e0a4271d02ba1c0afd38a7abe9e8bcf1d1747dcc705530bca1537d5e16a3b06af5170c9ce17c0c5a417fbc8679529994bb92419b2fce53e7
-
SSDEEP
6144:6o6QtEG7DLMyJ6NhhGgIEX9noRJg7AcgtVjiIADG8el:6RQtE8LNJ+nHjFoY7SjixD
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_7ebbb54dd8b2cc5aea696b2ad88abdbc.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5b86386daf6df9c3b45aee04d037a9e6c
SHA1d49dc2a0299657033c9232a262ffe6aa16c2c100
SHA2568b82d7746b4713de59016a5ff0e3f233a203d585a25632ff772edd9bacbefc1e
SHA5127abc3c636c502b5c7cc802df31fef75f0645b97a265009c6438a4cd99136329bd4f389624c96d527d9f69c0c21038b384fc41b17e33757faeec50befad4ce770
-
Filesize
1KB
MD5553109d02578771e73a42c7c7f8b528e
SHA19085fea37ef21fa86fb6ddf7a3e5109fd4bf79b0
SHA2564acfa06a4f15f0a3f54690b04801f9ba57bbf2f8be875bdbabb9006c6b5bbd6a
SHA512eb4d58633b58c6b283e57abc76833fe19a50444561b434edb4f28cf6a43e469f0b98ec81827443c370d86f213ffae6b846906ca14e72e3f551a32c359a157cef
-
Filesize
3KB
MD566d6fc77890c8b9487be00b06640075c
SHA1a961dc9e1ca777ffaadbbb09c15b3e5a24d34100
SHA25699584707a2d9f3b6db20a511a340b2ded4c6a2b1929d0bc29358f1c6e4a9c364
SHA512ae788ff173c57413516ad0f99f766a64a3f7455d2d80ef278cabab19896e8e4b80f323338b3fd2883f2b2329eb36e2a38c544dd27fc70532ded2513935d91b75
-
Filesize
4KB
MD5e41af78699d3d7582b87b2a8799f8a0f
SHA1f24f4c6009fc304b9958d8eea8e13e011a3d8c6c
SHA25644d8946ee9b97ac946f30da12d0173de3eeca7ac8f92173996c36f6d1bc41b41
SHA512b97ea8f61004fd3bf60d0aa614c355cb98acbbfddfbfb13800915cb8ea5c48cf54e9b9ec266cb958457d0e6cdf60803709fc954fe03b08eb5386aced943f6ce5
-
Filesize
59KB
MD58763679ca5b0d29e681db7f25d26c14f
SHA11c0e42aaa115725400c539458c75056be459585a
SHA2566a93931eac4f72aa7296b14eeb17618c38336bb8daf7fc5fc81f7c0078e33a6a
SHA512c791cf8e860bed15d127a424e3337dec948fc827459c8d5bfe2248ae04446d69c365b985126bb8a526b846dd47c6ba075e07fdb9fa5a56a08f67c27c3575cac1