Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe
-
Size
392KB
-
MD5
78090ce9e00f2a21eb3b78544b815c9a
-
SHA1
3fadbcb642f955caa23eb2b1d2c3d60cbfbd1161
-
SHA256
5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3
-
SHA512
4b572acb1a2981f0ea3816ffa4b17246f3d8d87bb21f70e0cb7fb19aea692d7976ee5e9a1ad46d3554e08527a6bbc6f9f58cf4f09276ea36374e021f9b0192d9
-
SSDEEP
6144:DtepDxKdvl+cSDvB2P8o/Xi5rHPsoYf8smjUSe1QrvEBGp4wYIGr:DteZxKP+TvM/crHnYUXj6QrvCGCwG
Malware Config
Extracted
cryptbot
unic12m.top
unic12e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5afa6d48ff429d440fba13d7d03f8d8e4b6ce6323c66b4803154d28d7ff22fa3.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5992d7088aab051dd1eac84ce36029d92
SHA1138d9b2ba2b263c91b0f9cfe0e8447b0bd18aec2
SHA256e9d3248e520c88f42df3245d01685b35c6196e84caf961780d3bad8be0566935
SHA512789c923db8c18c001737372519e63aef1c4291b7512caaf16f9a03fccacf2521dcce6c95dfaa8daf41d0a868538bdc3cc3c505b49658338d469602a6ac0e7623
-
Filesize
1KB
MD5ab42d3f6dbf53e68e8cf1125c16464b9
SHA17fe486e6b23d524b7cab6d0ef5022060633eff2e
SHA2569ee9c382af42ba85bcec2faffb8fb09de13f76e7396cf9e1a5e72ff8b6e96e1a
SHA512557717f164ffe9207ddd5775625ea0111bb1706ea93ff5a340ef27d8a2407f3d0eeea32a2aca45953cd277ec9d5037e27bade98caa87a0e3075db552da68cd34
-
Filesize
2KB
MD591d4fc52cc9d1438eeacbbca8134cf53
SHA1c169d1d08efba7c524d2b65af9fb45883f957f60
SHA2562a833ad2f07a1b6a44da1f54ea808d9aaecca81dddbfb8498df4557bb4f9a2b2
SHA512e8d9de32d70aca82c87c58c22187070e2a969f0aaa0712ebcb6ad7e5b282fb85e64464c2eaa2879c3f04c4b25fb4bf8bfdfa23159c05cbf82f44634ceff5c690
-
Filesize
4KB
MD55062073941591cb88c9a2b616812ebd3
SHA1420b2ae681194c387e636345e56c943dae2062be
SHA2567d5b149d51d73c4e4d4d901738cec734d145d22fb09bf9b59bf50a596e914ec2
SHA5129a0f87142640ae0cc9680ce64c29b2e094556c5ca48a6d7560ec75d8ab40ef36b3c6d61f99aeb4b762c59dea2a1fb22d52525a94686914bdb96595fcd034ba50
-
Filesize
59KB
MD51d73f3d8e83f34520206dbec58e65871
SHA1a5b98a4468b407929783930a98e83a6a19d6502e
SHA256882b1786e835fa17280e6e5501a1b31e85870331f41aae07621f1974bcce6016
SHA5124753a547b669b6a5919cf8ddefa26fa25c8d473d105474196cbe09ff1d8c820b7147869b024094f93228a4e7acbd7abd665bc322bbc21f582308c664858762a8