Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
-
Size
387KB
-
MD5
74c191d844d4fc482bdcb5f6c8e30621
-
SHA1
ce34dfe6fd8a54de554c4d514aefeea8629c52b2
-
SHA256
8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920
-
SHA512
2de028c36c39604572f562ca1256676760cd422290423847385bac123bb1d74d3aa63a77bfc040335a2cc3061048ad1333ca09ae211a5935913b5c677ca7527f
-
SSDEEP
6144:eVb52xA3WmGYNIniWb4Rahc7Cz7XbKRypn0QzPAh4C84CQWQ:eVbkOWmGKKiWb4R2cAc4Ac4p
Malware Config
Extracted
cryptbot
unic12m.top
unic12e.top
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2904 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2212 2524 JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe 30 PID 2524 wrote to memory of 2212 2524 JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe 30 PID 2524 wrote to memory of 2212 2524 JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe 30 PID 2524 wrote to memory of 2212 2524 JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe 30 PID 2212 wrote to memory of 2904 2212 cmd.exe 32 PID 2212 wrote to memory of 2904 2212 cmd.exe 32 PID 2212 wrote to memory of 2904 2212 cmd.exe 32 PID 2212 wrote to memory of 2904 2212 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\qDGRpFWfMi & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2904
-
-