Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exe
-
Size
586KB
-
MD5
ff0a0fb60f802d18b357b8b3506909de
-
SHA1
7ea1041d0287adcfe5189fcc6f84cb449220647c
-
SHA256
21a27023f4316ff356a2ff7d5c8ef5431d65217da4496820d8865666fe8cd11e
-
SHA512
377523a9a7b72bc03c2d40e71f27055ae89490ad776972eb8894469b395e4291c50ac951bf288d84d0e3ecdd9fc4c92976c8a7a2e37801dc5a99d9ab9542bbbe
-
SSDEEP
12288:2XoxQ9UJJrIU9/wL6Zzil5DtDELVsLffMjiOc5ogA5bssQ:2uQ98TJFuZsVsLkmVodJss
Malware Config
Extracted
cryptbot
ewayab32.top
morxeg03.top
-
payload_url
http://winxob04.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2460-2-0x0000000000220000-0x00000000002C0000-memory.dmp family_cryptbot behavioral1/memory/2460-3-0x0000000000400000-0x00000000004AC000-memory.dmp family_cryptbot behavioral1/memory/2460-222-0x0000000000400000-0x00000000004AC000-memory.dmp family_cryptbot -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exepid process 2460 ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exe 2460 ff0a0fb60f802d18b357b8b3506909de_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\YpIGosNYiqd.zipFilesize
38KB
MD50684a68a4c8b49d9f2cc1c3d421b7eb8
SHA196ef90f720e91e675f1a6d9468292cc70ebec7dc
SHA256054f8a66769e841c403c3dee7b08b64008f5acdd8d299b52aba0cfb0a1fb0d31
SHA512c6c9d03b08cc35adcf6bfd5ad88d3381766915bd3bc4a32009e2797f7091675f7f437f080d060df7e33ba3b2bf428b5b7602fa08c4cc8b18eaea3eaf08b89fd5
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\_Files\_Information.txtFilesize
1KB
MD5b77b5332f632f12205dcb33ce2f150c1
SHA124fdf058a120287be33cc95ce9842a9b7fb05e7c
SHA256a9a53bfdbb6b161496cb293b4a6c33e3c6946c366ff4c1feb9a57f69360ff0fd
SHA51290f62e788c9d91914edabf77754613e4e4161054ce48425bc5b81d6316e8593be7cfccb168fff8e0882dad8e5fa5b73882448787278d5a7892a62ec8507704b3
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\_Files\_Information.txtFilesize
3KB
MD5765ee2f8766d572a4169abf76db8c743
SHA1022afa751e42a82d1c564c4ba623f837baffdc1f
SHA2563310817406fc7b622205d32b4d2cbc62cb393d72d9149683abf1d19635fbcc56
SHA5127df1d98652d21b2520567c5c5d7a63430c58d3d156e5698724a5fbb25d486bf1be3b7999782d9456b94925b550d5837be5e547518d078f6ac0a8248765ac8b52
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\_Files\_Information.txtFilesize
3KB
MD59106c7ce759fca3dab3dd6db923b40f5
SHA1a061dca9023254e86355269aa7232bccf3cd2bdc
SHA256a9703a0463beadd171d329dfd0fa010759fea04cd9d276cded6dee08abc419d1
SHA5125cf836da7dbe6111bb8eced0366de1bceb15776c0f06ff8d77b7879ca25fe005d0d3d56d3b6c82518a4eaf963bbe31f9b2b03ad337217811de954dbe3e70fc1f
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\_Files\_Information.txtFilesize
8KB
MD53cec0af8ba9c7ef738a51117f9db32fc
SHA1b7cf0648e96df27e37390cfdf101f191ff75d162
SHA2564ba47a8a019cd28a0a6e0e1aff8f700a699412cb48c5e206b981000c61c80df9
SHA5127afbc98c41afd9b35a25225e63eda46ba09946b6b66c000ff6739d368cde829a19559da033c569a3d04c67785057d9d2489fab040c57c250fad8a4a65146163a
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\_Files\_Screen_Desktop.jpegFilesize
45KB
MD540fcf591fc648664c82250578c9a9378
SHA159ebd332646e0623838a2b55b9d05f62f3220325
SHA25631de57c57474c92cbe6454e257babed513996871296af2f9ede6fad7683792e6
SHA512e84be84475d524f913577a8892374ac6a368f3809e9e9955ee6115d1c4db1d8145be4a1cc8b4cc3f10965230863db37a3a77f895c493f58a2b475d6336393c9b
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\files_\system_info.txtFilesize
834B
MD51266562a012754c67442228f0e596c21
SHA14a99270af9ad4c0c455fe722dfc622caffd915e0
SHA256c834ab7594887655fde081b156f91edb55841ed4b45fd5b2dfebd5aad2f36a57
SHA512c3b37f041c714d9aa66a3aec2734046857d95d05c3b596d84ba92df782e30edb173bace4a302555765a3be1ee1a718698adc254a4653a116b53b96aa2ef56ce6
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\files_\system_info.txtFilesize
1KB
MD5190ff5ddbe989667bf4f58672fa030c0
SHA13846e3f3a62bb3a76f8c7f08bfa6dcfc03b6e39b
SHA256c8201906c00280a39968d1ed6e4715f5a80244219d129770774eb6858aeeee58
SHA512bd33f9e1102c994707329b49e46a9fb8f78c16023a441f8e026352e9df80923c28d2cb254429ab555ec5f9a3c91de81a22130d6c69ce1a5163ddbba103c6b548
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\files_\system_info.txtFilesize
3KB
MD5b9a215cddbec373bb4b61fc255e36d2f
SHA145faaaa3e6bf6aafc6a33f7639318cb6d609ddf0
SHA256643164831809ca0cf203f57adba81fa3f3cb3a8884b1aa52d46b6cbcc1da4e0d
SHA512459404369d7fa58fd35c8bfef8ff1f16e9d3b7ec9f7b564c9d920a1d78333b9997241fd2eb857b5172d0819e77017d896f667283710a0c3bafa85f3890caf427
-
C:\Users\Admin\AppData\Local\Temp\3sIKCMwP8XR\files_\system_info.txtFilesize
5KB
MD581c209904f5eb1a077589a01d1b73c1d
SHA1b3564721feb7dccff1d02862beaff7e473651f14
SHA256ed9dd49db0def4702208ae20fc0080213149a8f9f594ef0eedb04cb89f94eb19
SHA512c4c7d05a37eba102f354700a1229ec0bf7b94e51b124f072f986330db21c1e1139876e279e0a8d123abff8315609efb7b4052db5f2b6482b7d1ee52245ca3948
-
memory/2460-4-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/2460-3-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/2460-1-0x00000000005D0000-0x00000000006D0000-memory.dmpFilesize
1024KB
-
memory/2460-222-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/2460-224-0x00000000005D0000-0x00000000006D0000-memory.dmpFilesize
1024KB
-
memory/2460-2-0x0000000000220000-0x00000000002C0000-memory.dmpFilesize
640KB
-
memory/2460-227-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB