Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 06:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9176ab071ba35a4ff8c40b9f384f90b0.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_9176ab071ba35a4ff8c40b9f384f90b0.exe
-
Size
416KB
-
MD5
9176ab071ba35a4ff8c40b9f384f90b0
-
SHA1
b8e2e28f7fad66250010c9e7d0f8c0b72e437ded
-
SHA256
ec6e099f84fbabe87d76bdfd35ddfd5b152a7cfe76b486d51037bb36d85934bb
-
SHA512
14fda489e409cfbbbb20b5b0147b9b6aa2a2931ce098e27404d5725dc83e16c978d8e777f3ef4c8bba67fc8668a0d55a3a65a73ed4bc47a1081391b6222577e8
-
SSDEEP
12288:suGaGJ8PJd5cBUvoD+e/i2Nse4UpdQyxTl4KlS+T:s6CoJbcB9i3erxTl4
Malware Config
Extracted
cryptbot
cemnba72.top
morvuy07.top
-
payload_url
http://bojpyv10.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9176ab071ba35a4ff8c40b9f384f90b0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_9176ab071ba35a4ff8c40b9f384f90b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_9176ab071ba35a4ff8c40b9f384f90b0.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645KB
MD547d7b01eaf67bdf7df6e9b5e6e469a5f
SHA1a84dbed0b8f6ec6d339d6ff8f68e9ddb3b2a27e0
SHA256b92b4370492577a94fac21e6946995093ca736d1911bddb97788054f0ab47726
SHA5120105a2a7ccf5e1134479f039354f2f4dedf3065c7e61fe286edaa1bd1b767288a1f20770dcdf6ae2e16464bf1d84ac0b5621f14758810b2265b79505451aec3b
-
Filesize
1KB
MD56cdb8bbfe79453350abd94610cbf3b6e
SHA10aa6b1b200b9954861a947c3934d92229d86ddc1
SHA25696c3da8405b1fc6c2bed50f2f553fc8f8257274323329048321190128c29aa54
SHA5124358bdaf647dbde93a7434761390b24cbee10f72f4ec27a0304f802f667bc903fab24f66ba42cee8793336361100e6f616ec90802e7fa0e36b264a864cbfee41
-
Filesize
7KB
MD5bc44c1a60229fb4853233cd7ebf29e1a
SHA186e922b105162eb14eba0e4ffc73f7f05cd91ea1
SHA256507ac345588c644165b1c7b5a33124cc6b02addf6199e2d1a44ed2bda6be3efa
SHA512ae88a6ce113a4ac47876d764c84f1666593623bfb9c6f191e4308c1b94c6f64d2474f1b585e6074c2187a4a62ee234bb2aa40e0fcd60ce07042141861af11df4
-
Filesize
49KB
MD55319c70d71367dedb7bb0f34606a7902
SHA1648fcdc4ab0608bbc42fc8f739dcb216e2f8e663
SHA25686f9f16f13a17fca24041599475de45d83031b3d50b65350a7fafc8a1a880419
SHA512655db54b9c8e771b928a0f13b987216315c0f832ecf73e50c857f677d9448aaecd042e22793327283a13e74a5fc21d8cae4210c4150fb40494420b3206e6cfed
-
Filesize
689KB
MD59f4e0e010f1960bb4681c8bdfb2ce8f2
SHA197c2bb93b3118f303fda9dfc3c458862aafc920c
SHA2564f2345592316adc9c5f8a8a2f01bee68a891dee22257bc2e46b9b62c4766acd9
SHA5127090777c95a204550472209ff71a5d65032af1786e4c497a2effe97cd52c1f4c42c63077c218d29c3483934079c865e792974e0c9c4d3c7b5706428aea690151