Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 00:07
Behavioral task
behavioral1
Sample
JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe
-
Size
2.7MB
-
MD5
807266dee301da1d6f1c741fb3fec907
-
SHA1
ebb5f041e3adeda0286b366659308774c10d1494
-
SHA256
ec5813453a4a44c4c2b07238bafecc699bf2679b5962d3d4879a3d667b853d8d
-
SHA512
764784b63b228794d994d00b7de4a6459353cbe3d065e0f5dd49fd19ac28d3b5b3a460ec94cdc34c8ed6f1608314c442ba35c2250bb661d8d8626774ee345c14
-
SSDEEP
49152:MNPPzVce7Xp9pbK3oRVZPDEb4jf/fFeIKnGQ+Z+/u4ae8aMSSKtarkgjP2j7:MNDVcebprK4RVZAqXfFeznGgahSLt2Y7
Malware Config
Extracted
cryptbot
veotdm61.top
morizu06.top
-
payload_url
http://tynpdi08.top/download.php?file=loungy.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/5008-0-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-2-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-3-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-4-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-5-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-120-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-121-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-125-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-127-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-130-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-133-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-137-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-139-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-142-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-144-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-147-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-150-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-153-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-157-0x0000000000460000-0x0000000000B4E000-memory.dmp themida behavioral2/memory/5008-160-0x0000000000460000-0x0000000000B4E000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5008 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5008 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe 5008 JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_807266dee301da1d6f1c741fb3fec907.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5008
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD583f4b0a5e475304c2d75f415caaf2743
SHA19dfdddbf1fbe30dd1b266ae2e139204f5dda8871
SHA25686b64becd150a9a42e9aa1c950137864661b8f0c1366d1b16345d57b3e8f5967
SHA512b4d069bccf8ec956ef5a138d497f19ad88ef1f26b734d4cfd3aaf1b0b8b7ae3f0d983e0a188262c5452a45eebf45d78c9ecb9de7edc9c86a93cb72f7f3e6604d
-
Filesize
2KB
MD57d246a4205ad556dfea70175e3a68d9e
SHA1457c3d41b073f9a3f9a749a30171bbf361e421fb
SHA2564efd942f63309ae9218daea95849230696629dbcc39a2a1693925302abd84cd0
SHA5128a55004b4cd904f0b3fb16a0235280b476472284ac69a2777849402f7abb04d080f23372d2c063fbff56f5cf53c9eea450753c46327819a7ccafc885a7458fc4
-
Filesize
4KB
MD59903f43597801323677c816f81de6fbb
SHA107eab7743ddc07a2f44a30ecc9568f9e2613f4d3
SHA2563e51dea6ce3cf22911f3063ea7d523456b42ea853bb279ffd62bc86a7af1951f
SHA5124a3643ccc1d499c6e418d62c44c2030da900dde0494e46201ab60572b1126219007c5290224ac9757a0f3810cce33a7d59d621bafc74ccd5d5875b2e6743c0e6
-
Filesize
58KB
MD55802c28c9ded230635f2b3946a5f6092
SHA1043704436ef0cab209b9d2c1daa98f1471dee67b
SHA25603a5f760acc90779ee4dfb4ead3d6476596fd329448526e914a8e34577cced59
SHA512f5efa4f48d8515e01e33d42be42caf2679e97a1d56c38cdd808d76a38ae33d85dc34c36c57ee441fdabb8796e53b77d669a8b35ee396f5b7ba05aeca9839dd3b
-
Filesize
53KB
MD5fe00d4228c41841c5e14050bea29aac6
SHA10fddc06b6215675ebbbdc99d09e9f3450455efd5
SHA256118825ffc536ad06e9918882888f1889a1c1fee1c1656ba144e98c94af350f79
SHA5123193377dd09281ab6d2d0d4188ddcb077f2006e7f479f6a1e300357fcecc27dd07fd1650a078a0e5c31903abcfb42e72132f9c1903b95f6314656dda75436f58