Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/01/2025, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe
-
Size
346KB
-
MD5
5747ed332f72912ac53faea2b4442663
-
SHA1
eec858844eb7faf37f33854243eb941b9a61a15d
-
SHA256
264eb379519c57856467254c1350da612757e762ac3198046eced7353c35106a
-
SHA512
6504c7262be16daf970b77040596f6d7ccec45a39e9cba53517380ea8f11e56f23637c69cdb19f489e16e027f97034eecbd8506adddb3106b768554049405f39
-
SSDEEP
6144:6o6QtEG7DLMyJ6NhhGgIEX9noRJg7AcgtVjiIADG8elm:6RQtE8LNJ+nHjFoY7SjixD7
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 624 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1156 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 956 wrote to memory of 624 956 JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe 31 PID 956 wrote to memory of 624 956 JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe 31 PID 956 wrote to memory of 624 956 JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe 31 PID 956 wrote to memory of 624 956 JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe 31 PID 624 wrote to memory of 1156 624 cmd.exe 33 PID 624 wrote to memory of 1156 624 cmd.exe 33 PID 624 wrote to memory of 1156 624 cmd.exe 33 PID 624 wrote to memory of 1156 624 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\HRbhejAWfalw & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1156
-
-