Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe
-
Size
392KB
-
MD5
058f7b9b4a8bb3b2b9d1b95df28b3327
-
SHA1
987a880f3084e31cc0203955fde67a8d025169df
-
SHA256
016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf
-
SHA512
dc36fcec743e9329407f8ea9d2c876a6ab847bcb1562fb3469ca88ad3de21e9b8cb6543271d1d18e431642b2420da63638f2309196bedfa64c9b966f29469f35
-
SSDEEP
6144:CAJbwH122xhDf69M9T7/APRMN9JgX5B+Kkt0tFzQJ:CAJv23fsM17/yW9Jg/+oG
Malware Config
Extracted
cryptbot
unic14m.top
unic14e.top
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1488 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2576 2372 JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe 30 PID 2372 wrote to memory of 2576 2372 JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe 30 PID 2372 wrote to memory of 2576 2372 JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe 30 PID 2372 wrote to memory of 2576 2372 JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe 30 PID 2576 wrote to memory of 1488 2576 cmd.exe 32 PID 2576 wrote to memory of 1488 2576 cmd.exe 32 PID 2576 wrote to memory of 1488 2576 cmd.exe 32 PID 2576 wrote to memory of 1488 2576 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\uxcwqrXt & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_016b771e7703a7c73af8b3649925c44305298882722ebcf74892ad5e73ea5fcf.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1488
-
-