Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 07:44
Behavioral task
behavioral1
Sample
JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe
-
Size
2.7MB
-
MD5
c29c49f54236b95c5f6228af66c651c5
-
SHA1
92c2a13c39757b0b656b44e0d1bc55e98ed5cc00
-
SHA256
0218dd62759681af9aa77bfbd8f43af8de695b7426bb74aecdcd9f25ee53f3da
-
SHA512
4fd926d42951e3e29a9d7a78b787567d86a5ae01a5bdcbf56058dc61a86d71d6b7bf4254a6136e9844cf2530f1a9bb5f645b40e804cc1cc2602d89bf193a505d
-
SSDEEP
49152:P9eUwdL4wRqh7YqAVpymthcNRhuvo5NMAN7q4HmfT5RhJRr0UUK81Ezw6HdPd5ik:85zgSt+svYNMAN7jOhJRDrwId
Malware Config
Extracted
cryptbot
oct3m.top
oct3e.top
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe -
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
resource yara_rule behavioral1/memory/1056-0-0x00000000012D0000-0x00000000019CE000-memory.dmp themida behavioral1/memory/1056-2-0x00000000012D0000-0x00000000019CE000-memory.dmp themida behavioral1/memory/1056-3-0x00000000012D0000-0x00000000019CE000-memory.dmp themida behavioral1/memory/1056-6-0x00000000012D0000-0x00000000019CE000-memory.dmp themida behavioral1/memory/1056-5-0x00000000012D0000-0x00000000019CE000-memory.dmp themida behavioral1/memory/1056-4-0x00000000012D0000-0x00000000019CE000-memory.dmp themida behavioral1/memory/1056-8-0x00000000012D0000-0x00000000019CE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1056 JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 276 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1056 JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2568 1056 JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe 29 PID 1056 wrote to memory of 2568 1056 JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe 29 PID 1056 wrote to memory of 2568 1056 JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe 29 PID 1056 wrote to memory of 2568 1056 JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe 29 PID 2568 wrote to memory of 276 2568 cmd.exe 31 PID 2568 wrote to memory of 276 2568 cmd.exe 31 PID 2568 wrote to memory of 276 2568 cmd.exe 31 PID 2568 wrote to memory of 276 2568 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rPvdxpVWYgicd & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:276
-
-