Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exe
-
Size
623KB
-
MD5
eb749e44a75448c807d0af28f8b83e66
-
SHA1
f00ecf94d2ca07d843242b23b1d6e9f92d80c0ce
-
SHA256
56086c245c079cb9345f744d6c352931877ea6aa2286950f9451d3ec372d6e19
-
SHA512
f8ee99ab474ba6b797a2d5eddc1245080ff3272576fcdc3bfc5c9d32154ac2b20ddf0939fc98f2d4e66e81f89582f0a0e8a92996896bc29fc478cdd40a3b60c4
-
SSDEEP
12288:eKOR/0vrmf7SehkqWtVHd/me+NI7E7936QNq3PDQw2k:q/0vwkBtVHd/mNNS/DQ
Malware Config
Extracted
cryptbot
bunopq12.top
morkix01.top
-
payload_url
http://tobdol01.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2952-2-0x0000000002480000-0x0000000002520000-memory.dmp family_cryptbot behavioral1/memory/2952-3-0x0000000000400000-0x0000000002406000-memory.dmp family_cryptbot behavioral1/memory/2952-222-0x0000000000400000-0x0000000002406000-memory.dmp family_cryptbot behavioral1/memory/2952-226-0x0000000002480000-0x0000000002520000-memory.dmp family_cryptbot -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exepid process 2952 eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exe 2952 eb749e44a75448c807d0af28f8b83e66_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\_Files\_Information.txtFilesize
1KB
MD575ceee82dadd02138cc3296a974fcad4
SHA17cbf72aab2509b0cfb1f222016efba39b1e9fe8d
SHA256aa2f5c9cb6be9533b3beec284cc5098b6df7746166d4d19ccd3ccf18e1ba9e13
SHA512e3491ef87be699ba36ec7b006484939bfa0afe06f6fde71f03b9c4c5269ba8618b1667054e85381592a12ce1edce6b85de54c9a9e358b736ad38cca19a464646
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\_Files\_Information.txtFilesize
3KB
MD51d64d4a3d143b48c0abc2aa4bce858d0
SHA107618ccd12c6703e1845551d7e67913bd6e4021b
SHA2567bbb2a2878e7df323f6cf21e1a7cb26a9e8dce6309a3a7b2993df48a4c551586
SHA51205b4d572478d0a064c3c3ff4e6b1dfc8f3b4f2f75ceac8f7f769979340fb8c786ade206b0b938a7ecee9c93ff1aced55753d86b4642e70aa89d6c27a3d299817
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\_Files\_Information.txtFilesize
3KB
MD58e2ca09d24c328e3094f717255309afe
SHA1b1071d7968c7006e94a5aa7cb5fc9a57d4fb1ecf
SHA256ed13c6da78e2f3a0a68b57549168132c9961fefccb123e22c7c68cc9ac1b4786
SHA512d3dcc62c5e7b34ad6e4e03c25f6656d1a4d68316c679014d6723bb4252b86945c0d0469df7bbf717dcee203b314828844abbd50364a8833539bf62c4a9dd2372
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\_Files\_Information.txtFilesize
4KB
MD5c27de8b10e01c8261de049403bdd4ce7
SHA16bf24a7c04ca1e7e6e5fcd2a2ee009798ed04a7f
SHA2565b181a299b291164afd32819ffcf879ad73cd37b25690e82ec4396b0d7ed2ce4
SHA512f07856aea4b8d5eeb4738f5b444a798ed2b6822298a8699f80c629e17c390d7811d25254add2ea708ec8be97f430533458303fa9fcc0bd0ab454c9544c0df89a
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\_Files\_Screen_Desktop.jpegFilesize
39KB
MD56aefa252d620b843e2187f12c3aec17d
SHA148126c1574f80b998602911976170b41ce15fa2f
SHA2565e6614ffcc905635c6519fffea5c8c8983c156b08df4fb8f6c89d08e81c3d79d
SHA5123b100126da59c40dedebf30d3f0f40e70194a209baa2361ab765367b0c3b1ec28ee139c043e9b1e526d50e1148a902c80e2f5028ad4ff2b34649cb9bbcb8a5f7
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\files_\system_info.txtFilesize
1KB
MD5503272735c00b19bb92c909e572821d5
SHA1e9d07a73410b242bed9a10f8cd095eb4328dc9d6
SHA2567b347e5b3be7669bfbbf326498d0d91ebe4a55387555cee64d988d0c4212d391
SHA5127bac01892173e664fdba35ce8de5e347d36fb216352204be0bb536869442ec50560a718f6f91d609a2abe370fcfe19cd70809c9892063a7e9ec5f9b17005ab7f
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\files_\system_info.txtFilesize
3KB
MD50bfd77ab3d5f86aeb80b2307e7cb96bc
SHA1348b5f395888e7a1c957156e5e0269fd9ad6a8c5
SHA256a8d667982742f644cdd297b654ca5cbac053fc62b4554ef5c1517e34ab4654b0
SHA51280e883f884605384c6d9c58d168a7e5f38e6bf5e2a452fe8aa2fd819ed2d87d85b6623b7a8cc5cfc8864bf8ad1f4eb52e4344a4aacc409fb4ca6acecc06edc52
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\files_\system_info.txtFilesize
3KB
MD5c319d41f27e266a326d32e721dbc7108
SHA1b1225868c5e138b1c7ca083f366c429a719a67db
SHA2568f7b0c484c6fe989e8fd5f59b757e3bef4a2c9db4ec0b7c6125225670f990382
SHA51262e3626aeaf36da72807c808a62d6a734db86e370a4dfc5d31df9d54dc78f2db1f025b3ebc083031f5ffe53da300f44638ff2ae6836b7883855d6722afef1d6c
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\files_\system_info.txtFilesize
4KB
MD52d9ab33973d2f2a285a47fa821e57873
SHA1f6d211c9183a2527128b87ac2c0eefb998375aec
SHA256bf9c2c4c2c984704235be3e6837dace95382f9cda2c3376bd25e4c6deb02a3b7
SHA5120c7d0196ae1d6218310222b937f0d74c6a9410abfb1a33571980c8d653dfc6a9c7a73b2e0f54386da7b31e10d417516fc57cb0217a474f5158b9eaeaf316a266
-
C:\Users\Admin\AppData\Local\Temp\6OTIHUhfl\wfj7cqcbwQ28op.zipFilesize
32KB
MD56214237ab9d3834d319376f7c46a9ee3
SHA1e14eb868d936f1e9ead988daccce89f54d2a2081
SHA25694b398854d605839213294fb1f559129b913ad03b648c75e2d97460e10d9c064
SHA512598d58a80a4989ad0f8dee557d108495889566e5392e462cd74e827b596af99c99589e045a317c12c9ef3763af21e04094ef82c69598bbfcc30c1821e009e241
-
memory/2952-1-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB
-
memory/2952-3-0x0000000000400000-0x0000000002406000-memory.dmpFilesize
32.0MB
-
memory/2952-4-0x0000000003EB0000-0x0000000003EB1000-memory.dmpFilesize
4KB
-
memory/2952-2-0x0000000002480000-0x0000000002520000-memory.dmpFilesize
640KB
-
memory/2952-222-0x0000000000400000-0x0000000002406000-memory.dmpFilesize
32.0MB
-
memory/2952-225-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB
-
memory/2952-226-0x0000000002480000-0x0000000002520000-memory.dmpFilesize
640KB
-
memory/2952-228-0x0000000003EB0000-0x0000000003EB1000-memory.dmpFilesize
4KB