Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe
-
Size
404KB
-
MD5
a55575f00d96713172c9604a2099a246
-
SHA1
7a5667442edefd4e912aa7f08f6df5631e460368
-
SHA256
fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8
-
SHA512
a14af0077724c56dd7b2f674ec356cbcaa68d72cd38c2cedf07b0d4ac76d91b20095f6733b79f656c9cf15c3d2f15b01575a149b0167e7e0270ff013c3b261c3
-
SSDEEP
6144:sM8Sd+0q6EpCGeDac0cppIqKvkhzYCT2lSwkoQCQfN03xGwxj98:/d0CG0/pkvkhzYCT2IwkoMN03x9j
Malware Config
Extracted
cryptbot
unic15m.top
unic15e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fdb05119860be826ecbe76697608b4a8f75479b48810da4efc85f660117c12f8.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5faa5dec194b59c0b73def647ed9d3227
SHA11c96168df322c8ede099ab71029bf65327b5c0a4
SHA256045a6e5e239fef5a00e67374042bb770a0c2f932cb88eab2c0bdcb893c65b7da
SHA5120ef2d694f57b2e4b5cd9134f37bf7299c65569736053c7dd4f860625b176ddd8063847cb23ca5a7c0d6ea354ea729d61aa1a66c64f15498a428fe989f7e3f0aa
-
Filesize
5KB
MD50404c21ebea5d4121e2352378c0ec90b
SHA1f73b76b9e551d3d7f0c1799e84874e7d4e54da34
SHA256e97f4ef42fc791d42bd28de84f5329557c76d86a851b6961944a3288791cb0eb
SHA512d3590522d653fcd4dfb60755cfae4d8adb55c4955584c99513aafc57238b512114ad9a4223ea92f1718aefc24804bf663f7b2a6816cbc266a99c654de9432c5b
-
Filesize
53KB
MD5b656ee1e7fe1b0a839a5b8b228128f1b
SHA12ce798bce58575f53fee4364aea6bdae03ba195b
SHA2568912347154d68c3f642d5bf6167a154f4cc86af0fd5c7c9bb737940086883f4e
SHA51202a4695f1d2f1b4139b84dd0531f9829c51664b28f12121b1e5e44e190763acebe0c108f8ba577eaef7e33349f28b28f5e45a6cf3c1b79deff7a59eef0702b3f