Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe
-
Size
393KB
-
MD5
3c732dc10c69e957a4d38165c82b71ed
-
SHA1
71a32204d4c3e6783d617c9a3a8ec62f9cb68836
-
SHA256
51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea
-
SHA512
5c43393f6e0b1fde37459e83c6b6ef6361f9d86ba4859765ec989b9e499e01c4d6a053bdb989e4449756c7d1bcd63c01e17599f446ab986a7d5a60c79a271cd3
-
SSDEEP
6144:2g20NbsBNmedasOtnitCJ0lDvEwR9eMxrHuz2XbvR9iH4OPTv3:2g2sb6m0KlitCa1vbrROqDRKVPr
Malware Config
Extracted
cryptbot
unic12m.top
unic12e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51adb9247012627a5e206ab777d77bee8e8f8b5e364d3e2df6df53c2f6da00ea.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD57ef2fb88d33cf2f526aa7c4e89e2bb3d
SHA16470f7be7b0e90a87661dfe665595978e9e99058
SHA256d66c6d89725198ab775a971f2df521cf908478fdb6e7edceb17a507002117788
SHA512e26c6fa699941c8918aae312e533aa1607251fd58b7b4d18e315b92ec0c2599ce39bd420283d6ec88b4ad560e8d3efbf9f5793f5daa63aaf4fedf86905614f64
-
Filesize
2KB
MD5a29e509cdfd0f8917f1329120d524bef
SHA15287fd0d151422d484594d9a24e9e7b00daa6758
SHA256a537cd488076ae4326afe80cc61af3fcaa021e58ae7d684bb78c6dd441809f01
SHA5124da022454b3e966e5f673845fa312f99cd5de77876a60598d3aa8f5c58da7c47025cb4bc89e00aea2ffc30eb7aa8d29e1aa3eb68c7d0db409b86b40ebe032536
-
Filesize
3KB
MD521b26b5f5540f3e983e3da747225ec18
SHA15efec926509f9a81508c59950ee502b0369751d0
SHA25638fb1789bedb1c6f348c121ff2ca4971db10d3d82b803a8f74702e403805e117
SHA5129b87e1115fbc8fcd3d3c3f0097cf1bd581bd5179e910aeb4bd78a55142774a132bd4d8fb6c12545dc62f832a17a61b2a2812e963d91bb72e310c2e2312fa7250
-
Filesize
7KB
MD5aa92fcf126afd53cd24cabd47de1b669
SHA12d58378f866009de00753bdff7d62a783438b3bd
SHA25631b38a005b7c20e7f76779a2a385c68a5061fa6472ceceb05aa92f0634667626
SHA512a6ecd2fc757a259d6cbd8b936537fc49c42f28f03605646b3f3abdec3799cc647f4c5d2fad38efc719ea04c18fd6a7979bcc3082b117c73ed3dc9d0006706199
-
Filesize
57KB
MD5855a9bc16bc6c94e2d13d48d26935e08
SHA1ddda4752de87ac996381c2d5d346b6f17d124108
SHA2567e3c72d69c1aa459325e40d7ba1aae6cecad8f559ce535170b5affb7cde284df
SHA512eaed50d20ae8ba82067b1d33747045963df8777957204114305381d48f59b8fb49150853aac292c0d1a12b85ddc454909bff257d3eba049deb75376af7d7a289
-
Filesize
849KB
MD577cc38f9713d385e938d2f7628bdaf45
SHA1a146c05b0d5f0f9811a3196a435bad484dfaea1a
SHA256c6795af3537f010e41708531c150060838151ffc490d10d651bd21a6ceb2a0ed
SHA512e77b7f1f054f791597fd4f98814dcf9785e1795abe99dc832dcfe5c496a1627ec500a1855f5872ef8e6acf386cff37d82bd6e8dfac54e36d51e2747999640cfa