Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 08:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe
-
Size
346KB
-
MD5
5747ed332f72912ac53faea2b4442663
-
SHA1
eec858844eb7faf37f33854243eb941b9a61a15d
-
SHA256
264eb379519c57856467254c1350da612757e762ac3198046eced7353c35106a
-
SHA512
6504c7262be16daf970b77040596f6d7ccec45a39e9cba53517380ea8f11e56f23637c69cdb19f489e16e027f97034eecbd8506adddb3106b768554049405f39
-
SSDEEP
6144:6o6QtEG7DLMyJ6NhhGgIEX9noRJg7AcgtVjiIADG8elm:6RQtE8LNJ+nHjFoY7SjixD7
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_5747ed332f72912ac53faea2b4442663.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5dc985daa9a3838aadb3cfb336cce2ff3
SHA1d279898ccd508260a95ed00398cb186c36010a6e
SHA256061a9aefcd7f5d1b7ec38e42d4acf77bfcf0ef3d55f07001bda9588ca4834212
SHA51266d55538bf53fe03838b2f40fb99d03d24c47691492a59bbb32c4deb8f4bb182649ec6f58f92c8635bbb83ce5cc5e1c9f54965c799ad33831b16188a9685b6a5
-
Filesize
2KB
MD574d336d03fedb1aeaf9ed0010408b8b0
SHA1fbc5bdc1a5af6b55784aa0777e8a222f7f81c6b6
SHA25625f966afced8065cd2f07d07d3dfcdb68149ef556adc77b00a0914d90e7d83a2
SHA5120def05b2f93f860c78f1699ab478e97f4f1e366b936fd96ca54f8d92d650d39f661fe53fbf8acce325b767f53a7d6364e34c84a6f7dd960263f9407be3db6803
-
Filesize
5KB
MD57e3cb6b951dd87a90e009c1de6af131c
SHA128fde05d222a90533df6b0cd51f6fb855cf372eb
SHA25668d44a1072cd4264a91333318343f9a27e98d09550c39a75d2ad38ad76ff0f32
SHA5123a6209a3b8bbe89c5697dd36be5cba63d92434c12f21dd455cdce477b75ca9ae18ea9e8f7dbb03d73b36d61e1da9a5478e6cf4410abd410bb82ccaad3be03417
-
Filesize
52KB
MD51ca2daa1cae726af168fb1019f88b5eb
SHA1842094e3d36736abf70791be554071597368e446
SHA2568d09f260acae3f1d2a351c0d5aa6adff99239ea03b2ba968b1f50765f8cd3254
SHA51213a9896bbb2f277e70e3f3d9544763e3f400482c739014171446aaf91356bd48f52b9678241eba6d2d71fc1d3efadd48652d2f9f4523d7df8ef43d8722441eec
-
Filesize
640KB
MD543d6b0a6cf60cce38548bb6b48bbe420
SHA1864084fb1ba4a3e7e71ed17937b58cd12d292db8
SHA2562276b9c53ada896c44f571f581ac142915cffbabd9a7ee1244103b2bc36bc4ec
SHA512727a13be999bfe5144c03c043ad68b10f047c420c42bd97dfcd7a5fda55c53ad9ef3fe1bd5e4ec8db8e973e1c3cb7a471b5b360c3ee0c8b3a41fd07c66dc2a71