Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
e86b888ecea9692c31348554c521383d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e86b888ecea9692c31348554c521383d_JaffaCakes118.exe
-
Size
557KB
-
MD5
e86b888ecea9692c31348554c521383d
-
SHA1
59b2cbeb270908c441fd42d65664a820c71f2a70
-
SHA256
962a4193daff6b2f63d74054afef07f91d0c187f5191cb7d13eb1cce3af4e31f
-
SHA512
e6f2dda5fd62024faf1dd18fe31efc1d4cd71bf607adeac38d7dd11742fda0b40ce5621548390bad408b4c632a3745fa964372e10001b5522270d9af11e678c4
-
SSDEEP
12288:cTY6maNikdruhUIfVjKzC/9zGW4kmYqCViIatmg5nCZ+qzA8n9EwoO:B2ikpIfhKu8cqCViI08W89u
Malware Config
Extracted
cryptbot
hairdx22.top
morqoi02.top
-
payload_url
http://zelpdo03.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2156-2-0x0000000004480000-0x0000000004520000-memory.dmp family_cryptbot behavioral1/memory/2156-3-0x0000000000400000-0x0000000002CC2000-memory.dmp family_cryptbot behavioral1/memory/2156-221-0x0000000000400000-0x0000000002CC2000-memory.dmp family_cryptbot behavioral1/memory/2156-225-0x0000000004480000-0x0000000004520000-memory.dmp family_cryptbot -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
e86b888ecea9692c31348554c521383d_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e86b888ecea9692c31348554c521383d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e86b888ecea9692c31348554c521383d_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
e86b888ecea9692c31348554c521383d_JaffaCakes118.exepid process 2156 e86b888ecea9692c31348554c521383d_JaffaCakes118.exe 2156 e86b888ecea9692c31348554c521383d_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\_Files\_Information.txtFilesize
1KB
MD582a57770111f09f10ec841e96f53023c
SHA1b1bfb4aca4627afc790338a79665e14d6b7ed1e6
SHA2563ff203af13f7e6f3fb4303b5fbc6e71e811928eee95a759ee7f34005da9595d4
SHA512d33fca206ffa257b0fd7d12b5138ab7c15a951b3c75f5b423b653bcc5fe6455411527e51c0aed7049c0455c089c18ffe03a8c5c9bba74e40b6a9c6823ede86cd
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\_Files\_Information.txtFilesize
3KB
MD5818f882cf14a8e907c6a08623206046b
SHA1470c72bb39f13a9f89fe5c528178c204baea9f50
SHA2563d2e8ceaf09ff224cecf85f8148b3a210ce1f0d8d5908ccd357cd4f9ba53173b
SHA512125e5f241988b972cdbc14867f3e9538b75d1e3ac5fd7952cc1d502acc6aa21a5aebcda0de5b122bdf302b12e842f727fdc6d48e69a8c0b7e08710584b35cb35
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\_Files\_Information.txtFilesize
3KB
MD5b38fc943283cf629c0359865081ab4a5
SHA144ea1d6d855b3c4b0234991e72a594f1af201f26
SHA256dacd6d549af60f7749309a9e164c50488c111e087df9f3094b85e8eef33a8ec3
SHA512d8b9a9a756d8f45871293602866e596933b082430313b374b522f5d9694bf24b7e4d294448f47f725a7e2f6d85ba249bafa2c6a1ea7342456fc521547f6bd83b
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\_Files\_Information.txtFilesize
3KB
MD5e0a0497c6bd603a25b8be9d2577fca6e
SHA1fd2b83b297b2d38757fd665e27bfe52dbc0d22b6
SHA256378313990e444db459ca62036ef0ea65ea092f96ebf0c59788900becf02c0680
SHA51294fe5b00084c31ea7db282a125bcc2bea7c810faa9d586344b1e81751bf4f64d1732417579bbf6134b54a31a9dec371643ebe28f30062b8d18b01d31e0609ecd
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\_Files\_Information.txtFilesize
6KB
MD5ddecbb92d3f82d0003e46805e0733711
SHA19f3dbb2b9256a1f15edf360a07aaf29b1a7b1ea4
SHA256d7c3dafcd28fa5c5e7015b66cb3b946e63ae555621f7ae0a4b0b6be6182312eb
SHA51273ae26fd9e512e5ec05e7ae700cbde3f953656419447b60b1898a7d6f86ba390ce0c81566da9dcc515da6e55f4773b513b94bf3140793ffdb08fc2e6fcc18068
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\_Files\_Screen_Desktop.jpegFilesize
43KB
MD512e4517eb1daaf7cb4b0c693974551da
SHA12cdd02c7057aed08b76d478669cd028b9e1d6357
SHA2569c8b0ccf75095be3ecdbaf44d4f208c521efc06efa1d6756ba5354ca4559a37f
SHA5120a6bb2dc2a99534771c63a17a90adafa5125d5d12d66e315eea0d2aee74269bf02afc968c09b9d044f62a873045cfb7e1dcce0d9e09960bfe2c52f308373271a
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\files_\system_info.txtFilesize
2KB
MD5b352f3c0b9e17a97e6b96fd40ca0ed0c
SHA1eaaa33463739a3807559f1fee2056ac90364cf7e
SHA2568d4d2bdebf513db45240e6abdd9fce0eadffe484aa76397987989f1d38fee4bb
SHA5124f96beb655ea8e4ff1f56dff814c1ad298343a97c70d651978a113143de7a3f2a0e7f92110b00435c4b0765bfe9e3f01a4540385eba1be2e62f481b540f45c6a
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\files_\system_info.txtFilesize
3KB
MD58b925311adddaf6a33e719d95ffa160c
SHA12f2077171cd18fc8408f50dcf52f46a460feed8f
SHA2568d18e552cd71ae06593e86dd4cf6e6782951f7ce2f15f05886e1f2b8b653c558
SHA5129798bf85bc63e181a5ce8c7ac5036da3640b5db048da5dbec29cd4c979a20a77482abf531900fbc79264cbfd08792adf10a7dea0569791f2d1c4e74df637926f
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\files_\system_info.txtFilesize
3KB
MD50be6396e5e22760d96a5a98e833d0fef
SHA1bb1fe60a1e7fdfd658a913c56aafd7375daa47c4
SHA2560f19780ef39b0edb084480f2e5c0d91087e79988327e5464c5926f50d0589d3c
SHA5125f9a50b6911181e010124b9e4e7c6214d3690be0ebb52de4866e367338cfe002d26686e582e5b7b3f11115fb315ba305684405a0131821bbcc911a537c7b0850
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\files_\system_info.txtFilesize
8KB
MD574f95a2451d23fcd52d13ed1e3801791
SHA177e5b58a07e0b817855a32a6a898fc5219534f02
SHA25655d33c5252869eaba139fd69a69c1e91c3b7687525b0a9a175b6be94bb658308
SHA512624b36d05bb44f247e1790498555983def75dec094722f34a5802ebfc94041f4f0f55fecad7dc5f07820db93c7b06c63770c7b5edddd2b6dd97abfc6e27abd2f
-
C:\Users\Admin\AppData\Local\Temp\ToC61pkcoaM\yGAI1szLhB81.zipFilesize
36KB
MD5d573c3c5c918bc4d5cda87599388cc78
SHA1a0d2b259f38079abf8275eaf2b059de8a00f92a1
SHA256afe81704e3411ba6b5ecfd0245203318c8b529c5cc0a943f3942f0fb5235928a
SHA5128c084a9dbd074335e4b7a286034874ca8fe2a862d9791781def7148ca4d248e223101c3a0cfe4c7abb7ca5c10a0dd50f23ad3d9c23d9a2dca44a650c576b0538
-
memory/2156-1-0x00000000002F0000-0x00000000003F0000-memory.dmpFilesize
1024KB
-
memory/2156-4-0x00000000046E0000-0x00000000046E1000-memory.dmpFilesize
4KB
-
memory/2156-2-0x0000000004480000-0x0000000004520000-memory.dmpFilesize
640KB
-
memory/2156-221-0x0000000000400000-0x0000000002CC2000-memory.dmpFilesize
40.8MB
-
memory/2156-223-0x00000000002F0000-0x00000000003F0000-memory.dmpFilesize
1024KB
-
memory/2156-225-0x0000000004480000-0x0000000004520000-memory.dmpFilesize
640KB
-
memory/2156-227-0x00000000046E0000-0x00000000046E1000-memory.dmpFilesize
4KB
-
memory/2156-3-0x0000000000400000-0x0000000002CC2000-memory.dmpFilesize
40.8MB