Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 09:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe
-
Size
388KB
-
MD5
fd01ea3415d761f0c9289fe2630194fb
-
SHA1
72d6991b8b43ce94db7b1118e61753c5c2e0f490
-
SHA256
c415e164b8539e5b4d8232f5bbf359caa81250d78b1785cc074c3e204e689b97
-
SHA512
625a34ea0b561ee7e8fb7ab7f17346b40d7b28d46ccb96bad9687054dfa83fa1b2a4ab7f8199f4959b4e96e87a68fafe0a7043631450b1fd0fa2c30b894459bf
-
SSDEEP
6144:XNj6TYWryIIt5z5nYiXu1t7+y/urZkw5FwthSHP+WeoOM6WdNU:XNj6TvOnq1t+ymlkw5FwIP+WeoOSN
Malware Config
Extracted
cryptbot
veobav12.top
morysl01.top
-
payload_url
http://tyngle01.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2064 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2588 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2064 2324 JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe 31 PID 2324 wrote to memory of 2064 2324 JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe 31 PID 2324 wrote to memory of 2064 2324 JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe 31 PID 2324 wrote to memory of 2064 2324 JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe 31 PID 2064 wrote to memory of 2588 2064 cmd.exe 33 PID 2064 wrote to memory of 2588 2064 cmd.exe 33 PID 2064 wrote to memory of 2588 2064 cmd.exe 33 PID 2064 wrote to memory of 2588 2064 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\lIenSAQDNws & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fd01ea3415d761f0c9289fe2630194fb.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2588
-
-