Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exe
-
Size
630KB
-
MD5
e25cbaf3f12e860c2ab4654d70902e67
-
SHA1
ccb92bcfd20f2dd2653d6949b8868249a9dc89ab
-
SHA256
f3c94062ec97824744849119db80e25f7ff29eb464996484f91f87d5c923e7eb
-
SHA512
0f3fb1ef18402e2af5aa01f5ab9db36b2a1e547ebf4bf8b6d69d6fa7239b4ec4c7374160c750ad9d316edc14011fe7675f2f56a49cd5ff6058eb72365af4bca6
-
SSDEEP
12288:GR/JZdzym/dZbUOEq8tftv0InEmkXwoE:GRRZdmmVZbuDlsInEVXw
Malware Config
Extracted
cryptbot
ewakyc72.top
moraiw07.top
-
payload_url
http://winfyn10.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-2-0x0000000000350000-0x00000000003F0000-memory.dmp family_cryptbot behavioral1/memory/2032-3-0x0000000000400000-0x000000000146F000-memory.dmp family_cryptbot behavioral1/memory/2032-221-0x0000000000400000-0x000000000146F000-memory.dmp family_cryptbot -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exepid process 2032 e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exe 2032 e25cbaf3f12e860c2ab4654d70902e67_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\2u5PGZfIps.zipFilesize
36KB
MD5b07c5c274abf215505c2ed658db4d34d
SHA165ff24cc86dfe6537a0daebf4b14bf98be2203bd
SHA25655501d663548609b496d2f1b1d0c13491f6a7045d300a7a05f9fdaf79ea46730
SHA5126ba6d813c529343ab86f9e96d7ef4caca9577dfe11d07362b531b4bbc033fb98192be304e4fcfaa90b3f55decff7769e0ba8e2cfa9bf5e1608f592c8b9ea6310
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\_Files\_Information.txtFilesize
1KB
MD599c3646cd7947355364276aeb107954a
SHA153f5510f3115ee50befb1776576142bf76aa4052
SHA256b08278f6d137d8f12344bdfb3414aaf65205211e14717b7b5c731fce41718b92
SHA5124e097e977a4ba957c51c5f397161bb45a6069d47898985d0f5b8e41ef4c97889cb5a4ec41ab649699d5d93153ba491b40dbe86e54c747f7d6341954a64b2c455
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\_Files\_Information.txtFilesize
3KB
MD501c6ee1809b36278b64f449cc4fd0f89
SHA1534d4bc2e99c7c2f446db3c233b0462b059643e3
SHA256ce8fd3c8b64869d81b9e54f50f15fc8d17093889f3800f92d1c378303250172e
SHA51290de0296f57002cd24dadf2c0773b764de983a82f1a01710952d57b55f3f69b3711d971f87b0680038fddda970de735f524b095fc3f0a6e19f3b59aed6071de9
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\_Files\_Information.txtFilesize
4KB
MD5672e4e75fe116ca3335fe8a8c95f3be4
SHA181741828b637d29b325fc73e01bfbcfa0ef47787
SHA256761d02fec261e1ac9cc7a9c39d9264a2085b54e02b1d71044157afe51e490d8f
SHA5124373edbecb8bd5a4f6f44bf76057dbe78826bb5eb60ed05408d57fb238b289a62942f9eb8f9e6c54d66b5c9fde5ca89ffad921265f2edab44d428c976deebfe2
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\_Files\_Screen_Desktop.jpegFilesize
43KB
MD5f3211ee825ac93c89381ba46c763b361
SHA13b7aea6f92a50c78cd58aa3413cbe155da699d7b
SHA2562928c085246bce1687cd65a31d53f5a756a08ce0245bb4a850533ab4270fd8dc
SHA51297853ccfac5d37ad872ffa74e207743023107b453e33460ce8bfca39171354d130b8bac52058710ce15c391ff23c3441f5a084e6a3eb54743ebe91bf94bd2088
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\files_\system_info.txtFilesize
1KB
MD58cf9378cf2f175d7e0a0d8ce0ad9b026
SHA1afcc9677e27272a9b2ffd4a9df60f9a7412062ae
SHA256616d5a6de69846cf3f4349322f9dc1a13e3eca01459be5cc01df98d244ac2752
SHA5128289abd8bd490dda1dd07c09cd4df744ff51be15c58058b651945da9b7057e95760c1178d3aec5afcfeb23027f4bd149da5653416a45fd1ce8844b31842c9f13
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\files_\system_info.txtFilesize
3KB
MD52b0d347a9724ceb667ed19f0ce346ecc
SHA1971d2813cdff46f3f29fe43736bf9af62be7e70e
SHA2560b32db3f354e8af5e7e8cd6ff8e851fcda5849cccc15c2e02719834c7c7bf282
SHA5128b3dc16a98dba6e4e6d985d8e4d07d20af6713bce832dc9854f582298ec90b10c4566c3fcbe3486ca396e641f287b2f1449ca4ad56af889ceba109f77d338bc1
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\files_\system_info.txtFilesize
3KB
MD5bc2bc12882c50a7088d941a8234d5b6c
SHA13e058b28bcaa24b5cd3b8e0f514420b98b8175ee
SHA256733d278a5ca92a650e025f1b75ffb6edfc686e1e3908a87909c9188679e9d71a
SHA5122a972d39fe7280b3524c0be7d37570b804d1b45e3fa7463bd128a85a89a8405da059a170b9d8c2339f94b712479d33c1e531dbb14be9bd9f00540024328e14f2
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\files_\system_info.txtFilesize
3KB
MD58a71e3a152463a6cc68118fbbfad6042
SHA1e4a7bd9cb6cbee004c34119c200a0cc096cd9143
SHA25682a5db7eb4e7fa8318f585d4c3b1e6a4bea334cc6e29e3a3f64bef5b1b8f2df1
SHA51228f6f3361d0c60796989e5ae7d8bd03423fe919d4456cccbe544972a8899b4bfb0e287a48a66a7fd2ccdb997875181ceba7c5c1596bca0dc99a38783355241b4
-
C:\Users\Admin\AppData\Local\Temp\3i3LyraoFYj\files_\system_info.txtFilesize
4KB
MD55cc53c39417dcffba9d44bedceaf50a5
SHA1b8645c356832b5b9c9ae1cb2baa463a4bf18a875
SHA256f12e4d66ae3a00d6e2c52276349498eb1881c3a5dfbe60c9f6bd4ecbf7c8351f
SHA51218f59782b032066bbe985d2f3b0774d8167eb377a2da0dbc5ea17a792c9802edcd00d2afb73dd58fb2364f11d5b65e3d9b55073fbfa6a3a9c221d9c73bea2c4a
-
memory/2032-4-0x00000000014F0000-0x00000000014F1000-memory.dmpFilesize
4KB
-
memory/2032-3-0x0000000000400000-0x000000000146F000-memory.dmpFilesize
16.4MB
-
memory/2032-1-0x0000000001510000-0x0000000001610000-memory.dmpFilesize
1024KB
-
memory/2032-221-0x0000000000400000-0x000000000146F000-memory.dmpFilesize
16.4MB
-
memory/2032-223-0x0000000001510000-0x0000000001610000-memory.dmpFilesize
1024KB
-
memory/2032-226-0x00000000014F0000-0x00000000014F1000-memory.dmpFilesize
4KB
-
memory/2032-2-0x0000000000350000-0x00000000003F0000-memory.dmpFilesize
640KB