Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 02:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f4869964da97cd1c6a459dc0862e0537.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_f4869964da97cd1c6a459dc0862e0537.exe
-
Size
419KB
-
MD5
f4869964da97cd1c6a459dc0862e0537
-
SHA1
ca09397b71d5519852f2f459e9bb493b60570908
-
SHA256
d30efbcdbf30c57ad8bfb278d5098d7044762442d5c2553f5e5cf92e39bc7c43
-
SHA512
03a7bf9a73598f436da16e22f07dc1dedf8507743071d3630cb63182b73cd3d0a0a24a56f2a705aec8fd31f0dcddaa7203c8ab90351402ba0ebd2bae8ae28d38
-
SSDEEP
12288:QHEKqNxt0FXDFun2XNSNc6kk8v2OSSnsl:QtqNuZxQP8+OSC0
Malware Config
Extracted
cryptbot
veomho62.top
morizu06.top
-
payload_url
http://tynmat16.top/download.php?file=roamer.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f4869964da97cd1c6a459dc0862e0537.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_f4869964da97cd1c6a459dc0862e0537.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_f4869964da97cd1c6a459dc0862e0537.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD50f154a36dab1c28fd71948e56abb5136
SHA1915e8944e38d062fab298361e887601aa3f35a1c
SHA256150686d40220bd66231f6761f2177817aa5dc397ba58044e435b14ee518702b4
SHA512831598ad19dee1226da2a2a9ae7abfe0aa887d2df2e0b85aac355c3ffbfc786d4b529d58a57d0f23eded8fdf13edce9b6b633caa601ea4818ad013959fb06cdc
-
Filesize
4KB
MD5fd2186c78b289c42b408eb6e64b61907
SHA12551257813a2c200912779d9abb5aac05b57bc17
SHA256bb1eca7319ee23d55e8ff5bab09178428038b366c60d76160f1d09b5dbf59307
SHA512f539ca7f5e55275d50913b2b8a94fc12023b3c840800eea63730911a5dcd3c300e4806f838d81cd3717bec0db823d9835acfd3ee1ca996c542d88e4dfc849540
-
Filesize
52KB
MD57e796b19a6e7ff85000edbd3d03d9472
SHA1d9fbc83fee829a755eaaf7aa78f614b6e637ddd9
SHA256a485d59bfeb13c797246f68717e36e9ede4033c30065bebcaa21df054e2fcb8e
SHA512b53e910634f31c1b85cf9222439135d40c550a84dda83d942ca8e526ab50b08b44c7d8f948a63745c15211e4bbe0166ee87a7db1fca04bc581fe85978f737c11