Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 19:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d05bb6e2dd8b80fca50af85296dca757.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_d05bb6e2dd8b80fca50af85296dca757.exe
-
Size
347KB
-
MD5
d05bb6e2dd8b80fca50af85296dca757
-
SHA1
02f3ee798b04f233e622a400d58688d464ae322f
-
SHA256
beb6aae479299a359e58a6dea775616b30ae474c7de0e2083f50997455273632
-
SHA512
d1477933d96159a5c882f9251fab29775ace5c320f1dd31712017eef0fe27b34f7f6440b738aef0cdd31876492a0b191b4d5719ce85f474de23b6c95e478d5e4
-
SSDEEP
6144:ZLNfr9ti3Q7FnY3gH+X+0qH77kliXQIxZetZvuyLEHyglIADG8elQ:Zhfrbi3Qt+WKBk7giXQfaXxDd
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d05bb6e2dd8b80fca50af85296dca757.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_d05bb6e2dd8b80fca50af85296dca757.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_d05bb6e2dd8b80fca50af85296dca757.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5b73ed7045f5677686a82c6376ed0f5d0
SHA1f51a08062583825b98dde64d57d44079a947696e
SHA256c7b598246da6ef1e111845e73532f55e87eb51f70719b3ae9f0284f084c87853
SHA51299d181e6d4fcf13155603bc2574163ac3d0254766d9afa6bde53f36c7a7ba089fb5d8a70e42776895faed3ba878ab1f32fd48e952c9f19555132c5f0db8e3ce5
-
Filesize
4KB
MD5494f6b85892731d82da751a1b18b1c1a
SHA114859afd8a06c79ec4a23a22184b1e5796085c43
SHA256dcfea05edab015d3e655b8d4610e55924a08dae61974f730b079a3c43f5945d7
SHA512b33cdc5d0e518707551de7cc3d5a5dae8951819077767f749063ecbea9e1e3767dd139527f2eafdf7f6e48a1f815eac60a1d44667526b8f8c9be4d1a34e0efa0
-
Filesize
53KB
MD51e9b75bbaf60d2724d253ba08b99529f
SHA175b4e949caa3150c3e2ad994ea1d42b8690ed446
SHA25643d17830250f6a996e49491986b93db761ebc9416f7452863e6610aec312a655
SHA512886ff46b2a893e3767247dbccfb7a22858de7dc0f70a8dbca337ebe88c4e64cf5fc7c75ba79ee46bdfaedb050f560c0fc1d905dadcf1ecffc3497651243b5a1b