Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe
-
Size
363KB
-
MD5
0078fc3f4e4901195bfc323e4bcf2d59
-
SHA1
96de6dc9fd911a3d340287ceb66afd7e25eff8c0
-
SHA256
2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd
-
SHA512
13a80eb11043f653ca2d6c1cc2e544c77ecf0d002dee1c198cb70ef60d1fac033c305ae5fc38068f1cf922c7ce59bd8125ae75637d68b8d5dc62e65bb2086bdc
-
SSDEEP
6144:27smY4rQrDXbNwp83CTH8V/gctENEhKhl:27RrQ/bOjb8V/LEgK
Malware Config
Extracted
cryptbot
unic15m.top
unic15e.top
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1412 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2540 2408 JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe 30 PID 2408 wrote to memory of 2540 2408 JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe 30 PID 2408 wrote to memory of 2540 2408 JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe 30 PID 2408 wrote to memory of 2540 2408 JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe 30 PID 2540 wrote to memory of 1412 2540 cmd.exe 32 PID 2540 wrote to memory of 1412 2540 cmd.exe 32 PID 2540 wrote to memory of 1412 2540 cmd.exe 32 PID 2540 wrote to memory of 1412 2540 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\TiQZVmMScarc & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1412
-
-