Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 00:07
Behavioral task
behavioral1
Sample
JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe
-
Size
2.7MB
-
MD5
807266dee301da1d6f1c741fb3fec907
-
SHA1
ebb5f041e3adeda0286b366659308774c10d1494
-
SHA256
ec5813453a4a44c4c2b07238bafecc699bf2679b5962d3d4879a3d667b853d8d
-
SHA512
764784b63b228794d994d00b7de4a6459353cbe3d065e0f5dd49fd19ac28d3b5b3a460ec94cdc34c8ed6f1608314c442ba35c2250bb661d8d8626774ee345c14
-
SSDEEP
49152:MNPPzVce7Xp9pbK3oRVZPDEb4jf/fFeIKnGQ+Z+/u4ae8aMSSKtarkgjP2j7:MNDVcebprK4RVZAqXfFeznGgahSLt2Y7
Malware Config
Extracted
cryptbot
veotdm61.top
morizu06.top
-
payload_url
http://tynpdi08.top/download.php?file=loungy.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
resource yara_rule behavioral1/memory/2108-0-0x0000000000850000-0x0000000000F3E000-memory.dmp themida behavioral1/memory/2108-2-0x0000000000850000-0x0000000000F3E000-memory.dmp themida behavioral1/memory/2108-3-0x0000000000850000-0x0000000000F3E000-memory.dmp themida behavioral1/memory/2108-5-0x0000000000850000-0x0000000000F3E000-memory.dmp themida behavioral1/memory/2108-4-0x0000000000850000-0x0000000000F3E000-memory.dmp themida behavioral1/memory/2108-6-0x0000000000850000-0x0000000000F3E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2108 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2868 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2108 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2212 2108 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe 30 PID 2108 wrote to memory of 2212 2108 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe 30 PID 2108 wrote to memory of 2212 2108 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe 30 PID 2108 wrote to memory of 2212 2108 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe 30 PID 2212 wrote to memory of 2868 2212 cmd.exe 32 PID 2212 wrote to memory of 2868 2212 cmd.exe 32 PID 2212 wrote to memory of 2868 2212 cmd.exe 32 PID 2212 wrote to memory of 2868 2212 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\JqwUoIfB & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2868
-
-