Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 10:58

General

  • Target

    JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe

  • Size

    387KB

  • MD5

    74c191d844d4fc482bdcb5f6c8e30621

  • SHA1

    ce34dfe6fd8a54de554c4d514aefeea8629c52b2

  • SHA256

    8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920

  • SHA512

    2de028c36c39604572f562ca1256676760cd422290423847385bac123bb1d74d3aa63a77bfc040335a2cc3061048ad1333ca09ae211a5935913b5c677ca7527f

  • SSDEEP

    6144:eVb52xA3WmGYNIniWb4Rahc7Cz7XbKRypn0QzPAh4C84CQWQ:eVbkOWmGKKiWb4R2cAc4Ac4p

Malware Config

Extracted

Family

cryptbot

C2

unic12m.top

unic12e.top

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8887a0426df91e1c6aa2483824a2e4b8a700e6affaa88963fe1aef4a3a632920.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    PID:4560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\qDGRpFWfMi\QtfcndxjnXPudV.zip

    Filesize

    45KB

    MD5

    7b920eef1cfcbb08bb0eba9e9d06d77c

    SHA1

    f74331b59df9c9bd81c3df3b53baca021ef2ba49

    SHA256

    cfbf265ee785744bec6af4690cd538b5f8313d9337b717314ee5e875435758bb

    SHA512

    71c1ae8a30ce1609982faf70cfb1a59efcc29472de270e15ced9c01076bc202dc9389e2098311c877d28b31ea571b6251e92f87a1d159e5903852613d470ffad

  • C:\Users\Admin\AppData\Local\Temp\qDGRpFWfMi\_Files\_Information.txt

    Filesize

    1KB

    MD5

    e3ff08e6f137e0555aa6cfc5ee93062d

    SHA1

    99fb0b6dcba945ab849526797bc79b9417cc2524

    SHA256

    b461e6aba61a00f2e6f2c19056fbab9090851a020565b3ad1b16725a51ef1762

    SHA512

    1befc75407e2685c7b241a2f1ee0a2c151a9b1deb5c2f3c543ca4846d6abc8bfdf1ca94da898e2f021dce141388fe5162ef76fe43972ccc3f4c3244c5d969c5d

  • C:\Users\Admin\AppData\Local\Temp\qDGRpFWfMi\_Files\_Information.txt

    Filesize

    1KB

    MD5

    d23a121734ae4b26717b38d0aedd9d78

    SHA1

    58920e53047286a60bd143ebb14d40c93ace1d06

    SHA256

    17419d8cd012f88219b0b3f4eb90d6b4022c9c53ddaadbb30b28be7b2f2a1fb5

    SHA512

    41f9e03948aa9f21394401c3346a4a6f823109cf8a4087fb29dd330666a5bbb619e67ab045f3d053ebbdc70a1aeeef3e9581ad87ccdbc85ddbdc0d7e93d984b8

  • C:\Users\Admin\AppData\Local\Temp\qDGRpFWfMi\_Files\_Information.txt

    Filesize

    2KB

    MD5

    78962c879ae0806abc5e3985665e02c7

    SHA1

    0a0c05e5bec25953347cfa6e25e0d5d674b70c42

    SHA256

    80d3e05b5f34fbd845e2ae79a46aa34fb2cf668b5da8d211c0c0eb98c8a56251

    SHA512

    b135ee0d0bc774276d9ba34e7178557b68bc0e8a6cc32912c79a1643367b4ca2ba17b36ce53d7948d87af75f2aa87f6af07007c7e2e2f09337506f13c61ab43d

  • C:\Users\Admin\AppData\Local\Temp\qDGRpFWfMi\_Files\_Information.txt

    Filesize

    4KB

    MD5

    866aa200248e5078dc6e78c3b02f9882

    SHA1

    100d690af88742a718b9a407d607d7d9e76a5850

    SHA256

    07b0fded302bb0d64c8c3652058825508069b469f314d593bb87a8f70e2838bf

    SHA512

    56845fba3b9cefab7462eb0fd00ff7c18ec9a68b88cb95335c7f52311f5ce963f587dbb72c6f8c2376c1be968ff3e12787ef586def095e7a0a49059d3e7ed181

  • C:\Users\Admin\AppData\Local\Temp\qDGRpFWfMi\_Files\_Screen_Desktop.jpeg

    Filesize

    50KB

    MD5

    cee6e184420d235fd2e4769ceefa92ec

    SHA1

    c82602e227b936d810a5485015f2094cf9f923aa

    SHA256

    deb09036f8dce67b1779414ef4261dbc9a495ca6f5b326fc051146076de696a4

    SHA512

    52521a0f36c7890eb86699284491423ef33b67fecd440d9393878c8b17bbaff59d4cac47c537b032e75d7c2418b6ff9487bca7246bde56ed9bd3b583fa37de4a

  • memory/4560-123-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-129-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-114-0x0000000000840000-0x0000000000940000-memory.dmp

    Filesize

    1024KB

  • memory/4560-115-0x00000000021E0000-0x0000000002227000-memory.dmp

    Filesize

    284KB

  • memory/4560-117-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4560-116-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-1-0x0000000000840000-0x0000000000940000-memory.dmp

    Filesize

    1024KB

  • memory/4560-2-0x00000000021E0000-0x0000000002227000-memory.dmp

    Filesize

    284KB

  • memory/4560-126-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-3-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4560-132-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-136-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-138-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-141-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-144-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-147-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-150-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-153-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-156-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4560-159-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB