Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe
-
Size
393KB
-
MD5
3c732dc10c69e957a4d38165c82b71ed
-
SHA1
71a32204d4c3e6783d617c9a3a8ec62f9cb68836
-
SHA256
51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea
-
SHA512
5c43393f6e0b1fde37459e83c6b6ef6361f9d86ba4859765ec989b9e499e01c4d6a053bdb989e4449756c7d1bcd63c01e17599f446ab986a7d5a60c79a271cd3
-
SSDEEP
6144:2g20NbsBNmedasOtnitCJ0lDvEwR9eMxrHuz2XbvR9iH4OPTv3:2g2sb6m0KlitCa1vbrROqDRKVPr
Malware Config
Extracted
cryptbot
unic12m.top
unic12e.top
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2164 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2788 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2164 2280 JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe 31 PID 2280 wrote to memory of 2164 2280 JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe 31 PID 2280 wrote to memory of 2164 2280 JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe 31 PID 2280 wrote to memory of 2164 2280 JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe 31 PID 2164 wrote to memory of 2788 2164 cmd.exe 33 PID 2164 wrote to memory of 2788 2164 cmd.exe 33 PID 2164 wrote to memory of 2788 2164 cmd.exe 33 PID 2164 wrote to memory of 2788 2164 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\bFfmXMiWBeWGj & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2788
-
-