Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe
-
Size
387KB
-
MD5
87fd447e1dfc44afef7593f5dd27a427
-
SHA1
4101a9c049fc91ea24d65824d10f95263eaae88c
-
SHA256
5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194
-
SHA512
590bd88ef61e87b45fcca3634556635b94a7015e0f8b016d714c20ac0fde3ce2f2e7e975f7a4a8d064c66d157eb968e0e9b81d4abed3ad456bcb4610f0fe4993
-
SSDEEP
6144:SNb52zA3WmGYNIni6qeNfYl6LyIA7tt1a0FNgjFX:SNbkoWmGKKiVe8gyIAhtjNgh
Malware Config
Extracted
cryptbot
unic16m.top
unic16e.top
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2092 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2844 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2092 2340 JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe 30 PID 2340 wrote to memory of 2092 2340 JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe 30 PID 2340 wrote to memory of 2092 2340 JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe 30 PID 2340 wrote to memory of 2092 2340 JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe 30 PID 2092 wrote to memory of 2844 2092 cmd.exe 32 PID 2092 wrote to memory of 2844 2092 cmd.exe 32 PID 2092 wrote to memory of 2844 2092 cmd.exe 32 PID 2092 wrote to memory of 2844 2092 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\cNtpWSvevbD & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2844
-
-