Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe
-
Size
387KB
-
MD5
87fd447e1dfc44afef7593f5dd27a427
-
SHA1
4101a9c049fc91ea24d65824d10f95263eaae88c
-
SHA256
5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194
-
SHA512
590bd88ef61e87b45fcca3634556635b94a7015e0f8b016d714c20ac0fde3ce2f2e7e975f7a4a8d064c66d157eb968e0e9b81d4abed3ad456bcb4610f0fe4993
-
SSDEEP
6144:SNb52zA3WmGYNIni6qeNfYl6LyIA7tt1a0FNgjFX:SNbkoWmGKKiVe8gyIAhtjNgh
Malware Config
Extracted
cryptbot
unic16m.top
unic16e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5749ca3bba0023fc257072a67da7724a772399fd66bbaf825527357a95bed194.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD59d94d079d94458076b92699309ce43b3
SHA158c22fcabfbae96bcab29bbf338d5992587111e9
SHA2561ec23ff0271c6d65bc0fbbfb0502088d1a9ec706faa5f2cd24b4809bab2d1823
SHA51232f1e6efd9116063bc2f57e09efcf7d49b18c02d9fcbd6c455a73052e44511e5df1b16c02912fac2fe28ec0e0c7619e57447b2e66d60b584a94c6377dc2fb5c5
-
Filesize
1KB
MD5e68f4c149f5d76247dd845b67a772c5a
SHA14a3ab4a6b75ed1bec94c42c4af7f4791fb5b3daf
SHA25600b09e72b73e587162f903dc1f1f3eb3543253625ba229eebe23261ed7348b67
SHA512bf5426443a976ca359879f02d098d770557bdb31bb2624f80b8a08e19dee56e85fa5e74315f4f6763b877151dfc35da45ee5aab9f89053b28f8e4308b3a88a50
-
Filesize
7KB
MD5d4669cfdb693c2b96a210da68896fed4
SHA1d70ce4d825a7a5e70290b3be41ed4d0445580e17
SHA256efd2d1a94de0b97617ef6d19ba026c543d6079538665f47421b60e84dda3f420
SHA5128c535488f7d13fbb808de8610b5f017616b6b9376910cdd7535f64fbf1492c1cfd15ef5ac631aa87ef2ce1f23ab0b175e8038ab321dd41ec7807b11e1064f51b
-
Filesize
60KB
MD5208eb62b071288c208266ff9333cef85
SHA191ef967a43c0b53fca3cceaa7ff4b6548b1d782e
SHA2564cea7bd798d502d353e8cdc1b81ea55eeec97310cbd94b3415aa836aeec6825d
SHA512fc6b742e87a3df6ae8f8fa3865ba820073278fc9716f218782485fdb3c6333da30c1b33e86b1140071bd14986f69c637edc29fd596ca27070650a05430e9e21a