Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe
-
Size
387KB
-
MD5
cc83a01c8cacb56e7c2dc84ae265f8db
-
SHA1
9ac9c2178d2dbabd505a72f9ae60dca02feb3569
-
SHA256
e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c
-
SHA512
18ade81644abf152c7d12b80fc934476e9013ec73f8a54e4d26e0eb8fe8c1cfbce913279d1b51d6a262d570a49acd8a53917bd77cf0276dfa4750229cc166ec4
-
SSDEEP
6144:iEb52BA3WmGYNIni1qphtDScY20NpvV35PhNLsFfgDF0pbFeN:iEbkeWmGKKie7NUpv55PX30pE
Malware Config
Extracted
cryptbot
unic12m.top
unic12e.top
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2020 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2804 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2020 1508 JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe 31 PID 1508 wrote to memory of 2020 1508 JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe 31 PID 1508 wrote to memory of 2020 1508 JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe 31 PID 1508 wrote to memory of 2020 1508 JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe 31 PID 2020 wrote to memory of 2804 2020 cmd.exe 33 PID 2020 wrote to memory of 2804 2020 cmd.exe 33 PID 2020 wrote to memory of 2804 2020 cmd.exe 33 PID 2020 wrote to memory of 2804 2020 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\vmUJosKfFD & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e9d9470a308f2e7da4699bed0c6cb12e8598c559edda6dbdfac157f6cccddf2c.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2804
-
-