Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
-
Size
387KB
-
MD5
74c191d844d4fc482bdcb5f6c8e30621
-
SHA1
ce34dfe6fd8a54de554c4d514aefeea8629c52b2
-
SHA256
8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920
-
SHA512
2de028c36c39604572f562ca1256676760cd422290423847385bac123bb1d74d3aa63a77bfc040335a2cc3061048ad1333ca09ae211a5935913b5c677ca7527f
-
SSDEEP
6144:eVb52xA3WmGYNIniWb4Rahc7Cz7XbKRypn0QzPAh4C84CQWQ:eVbkOWmGKKiWb4R2cAc4Ac4p
Malware Config
Extracted
cryptbot
unic12m.top
unic12e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD57b920eef1cfcbb08bb0eba9e9d06d77c
SHA1f74331b59df9c9bd81c3df3b53baca021ef2ba49
SHA256cfbf265ee785744bec6af4690cd538b5f8313d9337b717314ee5e875435758bb
SHA51271c1ae8a30ce1609982faf70cfb1a59efcc29472de270e15ced9c01076bc202dc9389e2098311c877d28b31ea571b6251e92f87a1d159e5903852613d470ffad
-
Filesize
1KB
MD5e3ff08e6f137e0555aa6cfc5ee93062d
SHA199fb0b6dcba945ab849526797bc79b9417cc2524
SHA256b461e6aba61a00f2e6f2c19056fbab9090851a020565b3ad1b16725a51ef1762
SHA5121befc75407e2685c7b241a2f1ee0a2c151a9b1deb5c2f3c543ca4846d6abc8bfdf1ca94da898e2f021dce141388fe5162ef76fe43972ccc3f4c3244c5d969c5d
-
Filesize
1KB
MD5d23a121734ae4b26717b38d0aedd9d78
SHA158920e53047286a60bd143ebb14d40c93ace1d06
SHA25617419d8cd012f88219b0b3f4eb90d6b4022c9c53ddaadbb30b28be7b2f2a1fb5
SHA51241f9e03948aa9f21394401c3346a4a6f823109cf8a4087fb29dd330666a5bbb619e67ab045f3d053ebbdc70a1aeeef3e9581ad87ccdbc85ddbdc0d7e93d984b8
-
Filesize
2KB
MD578962c879ae0806abc5e3985665e02c7
SHA10a0c05e5bec25953347cfa6e25e0d5d674b70c42
SHA25680d3e05b5f34fbd845e2ae79a46aa34fb2cf668b5da8d211c0c0eb98c8a56251
SHA512b135ee0d0bc774276d9ba34e7178557b68bc0e8a6cc32912c79a1643367b4ca2ba17b36ce53d7948d87af75f2aa87f6af07007c7e2e2f09337506f13c61ab43d
-
Filesize
4KB
MD5866aa200248e5078dc6e78c3b02f9882
SHA1100d690af88742a718b9a407d607d7d9e76a5850
SHA25607b0fded302bb0d64c8c3652058825508069b469f314d593bb87a8f70e2838bf
SHA51256845fba3b9cefab7462eb0fd00ff7c18ec9a68b88cb95335c7f52311f5ce963f587dbb72c6f8c2376c1be968ff3e12787ef586def095e7a0a49059d3e7ed181
-
Filesize
50KB
MD5cee6e184420d235fd2e4769ceefa92ec
SHA1c82602e227b936d810a5485015f2094cf9f923aa
SHA256deb09036f8dce67b1779414ef4261dbc9a495ca6f5b326fc051146076de696a4
SHA51252521a0f36c7890eb86699284491423ef33b67fecd440d9393878c8b17bbaff59d4cac47c537b032e75d7c2418b6ff9487bca7246bde56ed9bd3b583fa37de4a