Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 16:20
Behavioral task
behavioral1
Sample
JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe
-
Size
2.5MB
-
MD5
e8abf51b99ff390aad5f8044e88ac806
-
SHA1
0004179b8721abb457d17c6ede713ddb1152640a
-
SHA256
8a7ab275acf36cb7306f18f953b72f45213904632243a8290d8868008b5f4ae2
-
SHA512
a01cb76c58a3cd1d96fdb128ea9707e4af163b2531980c1b5b07826fdd2456e1e95fadc31317456eba13d9a4bf74e22f222817e48033194833927bb74a531c87
-
SSDEEP
49152:okFvNW035OI9Q/RKs2f8I08WWKH9FXBj0EjtCOmHgYxrhebg+b:ooNxJO0Q6E/8WN9j0iDmHgYObVb
Malware Config
Extracted
cryptbot
veotyc21.top
morpib02.top
-
payload_url
http://tynoev02.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3896-0-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-2-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-3-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-4-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-5-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-120-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-122-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-125-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-128-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-131-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-134-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-136-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-139-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-142-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-144-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-147-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-151-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-154-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-157-0x0000000000C90000-0x000000000131F000-memory.dmp themida behavioral2/memory/3896-159-0x0000000000C90000-0x000000000131F000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3896 JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3896 JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe 3896 JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8abf51b99ff390aad5f8044e88ac806.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3896
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD582f4dea6f516c392f1814a26981344bb
SHA1570de4f06bc135493fe2f6f6096887b834739e95
SHA256a520545189af6285ada709d0755f2a8223f36a3fe4b568ef92a52789699ed8fd
SHA512556f01f1d2c01573d5966f91687a766ba57f66a5d86268c11364bf413709cb1d03b0afc2e501e01129c5a16c14411310755afe148d6fbfa429a0e4e6472049a9
-
Filesize
59KB
MD5625a3242f87ad3dd6cc42da195cf64c1
SHA13ae01c3d42aeb8cbc7751483de9edc2cbf9059bc
SHA256027aa6e08b9108e063f777a0266b39a57ffd0118fc336ccd0fefb69fe72e1823
SHA5120162d0faf3bd10df9c2b0a1d9720ba47feaf9bdd4b582489c83ea2fa670c446fc229e9b2d9fe9101dcb8a3047f48a79c6d33d930385187eba7363a4840ca861f
-
Filesize
54KB
MD5b77f8ab8656f6734de34803ad19c0072
SHA180da0b5fd0ca46f9486cdc398bec7bcf8db7958b
SHA2568da3aaf66d24a8c4d2f33d0561d4a68b2015cf623c1590937c27fef93d9d54af
SHA5126b18ba437b0502d25bcb7118b0cd7b7914796c26c71605f6c0d24fdeae1b072325dfff0b5cdbfa42a559b0319a5df64ac3f6aa1f0cf2b453c708fead6e9df85b