Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe
-
Size
387KB
-
MD5
10705f8044a34859d05cb87753ba8069
-
SHA1
5a64633a72ad22a74b381af8c0be1f39068fc93c
-
SHA256
f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0
-
SHA512
76f8c23f3b213cffcc249e54db9c5ea744df07374149a1d2b012b09b02938efd9bd8ac489c15ca4f3a3c24eadce8a308576f1de3f430470f8d62d07ef056c7e7
-
SSDEEP
6144:haTNtmVs7XZj0vjSUtcCPUNdkHMQV+u2bWac:haBtmMXZSjScCkz2b3
Malware Config
Extracted
cryptbot
unic15m.top
unic15e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f845fcb8f6deb74106ecf33d3218f4e62e41583f574636d1f8100a4a4ce46fd0.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD511fff72e6c7a19fb00c1104dfefc3f1f
SHA12d623704fad23a10d08c3d847111426eaa0a43c7
SHA2569dad225f315dcaf7f8b10ea0a46ea4ae5415b8464dfb9193df91cb84ab62e5d7
SHA512079f8da68e62a5cbe6ca6b11bccc71a5fc7204ea3f6961b331329339c45f1c9388dbe6256c0d60d8ace3a6f72d6c1271ce9cf108e7bc0ea733101ee7ec5bc0a5
-
Filesize
1KB
MD51508ec29b468e4f43c27a1551c14993e
SHA1e4481ecaf0e5f2d8699114af3b17f7f82c040813
SHA2564945f00d1f4190074b49ca0651e22c8d415ed558fd35f268885c1278ab36a297
SHA512b4ab8b740c17375873598d69714ffdc63720de8357780b8f7f40ff847024732ef28af5029de7420989153ea83d59452f1f1dae289e1f23de1f5243932f9f8aec
-
Filesize
5KB
MD57a97dfdfd081701f23100e896e9420f1
SHA18986a9ef680c90d2c5fdc50323f34ba5e17b3536
SHA2568377cd8ba9033d05d6e8c004120a7abbda3554630d03df0ae614bf3db43ee505
SHA512c9762c27f1debf245a466d681b647411176b429725953e62f7456467009aa6e4eaf6404637a9d78872c53dcce32b4425f72b70861b6032ecd4a8b6d6df0b9bd5
-
Filesize
54KB
MD529b5e04c455e905c8610626ded8365f6
SHA1b9992dc40e106a0dbb7c9f3f7ff0322c2a50052d
SHA2569ddf9299c65215486e5ccabc39e941a739c296a9a181d98551bc2a5ad2278e22
SHA51294f8370f9a8aa486d8a74990cb785b6d6c84cee73f934776675a2606149ee8028b43ce800be44f090779f1e7963c8031b0ad2c4afcef0d0f98d9a2579bbd01df