Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe
-
Size
362KB
-
MD5
96b76902694e418b9bd8c476a7e2a9d3
-
SHA1
fe4d12ed4eaaa9342e4cef187eed31eccdb1dff5
-
SHA256
19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2
-
SHA512
240942f9a13d02eca16bfb26a1697ab0649dd5b6fea19060bc9ed77917a04f88cc2fccc00dce91d97b90f60742397f3ac776294244feb9cb839de3159ac2f084
-
SSDEEP
6144:cTsmF4rQrDXbjzuFzkEEIvoZh2uPsKjAYT2ThKMlU:cTcrQ/bjzuSEQh2uPsK7wKz
Malware Config
Extracted
cryptbot
unic15m.top
unic15e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51057229bf9e3ede3349f6f3f3c34ad5b
SHA13a0fd7cc3af7b0900d79e56da3a40d540333dd1d
SHA2565ca4e424b9a58f40e295a724ccfe0e629aca63f59a181aaceeb01fb9aae73e34
SHA51243591c3728e3c640859d237efcac6ed89c4647d770ddb305af6d0ba2d03c66dae2ee8b48179fe69b7fbc99bd4b93b6977e89dc7d1b5e830ab8e84a9e5a81fb48
-
Filesize
49KB
MD50a9dd89cc029ab6f425d01b20fba9e1e
SHA14c3763a8561838c1684b1e4cb8ded85e61c8c699
SHA25675df16e318dbf1ee23a91c8254e28e2dd6a700b02891c9ee594527e894f67e8d
SHA51258b83313c5f59914aa7040c18457ffd83ea575bd15b3a6c2c6d2888649b6e4ca3b8bdae2651ca771706ab81e25e1807790d59455bad83876487f6299ffeba975
-
Filesize
44KB
MD5860daf8cce1605ecd1bb6b64fdf24c40
SHA1ad68cd5652ffbdc0de5445e9552500c785cfef12
SHA256d8f6c077ce0f0582253574e795336c1707ccf305cd2a14f6ae6535f6b7c9e644
SHA5121e7910733ff55fb2341919afe4b12c90a8c94a469d972239c8187869e40692cadb5964e16d265188199c8cc25f3db7c99e04b6891cc0fd292b648d6f2608c473