Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe
-
Size
387KB
-
MD5
da6aae5a8de3423b5930348f0118a189
-
SHA1
3333b39ae134a1e102d00c5241e2cb7ea7761dbb
-
SHA256
20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec
-
SHA512
1901a501d5dee2cc2dc78c8a102c9e686dc16fe7913382fbda353b52c5f8d2aa4603e2bf53d4525181faf5093040940b7a07740440594d459fabf641cc612012
-
SSDEEP
6144:GRTN8mVs7XZj0vjlcAmgRQZxli5H/9l1R74X7vAGa7k8Ty:GRB8mMXZSjpRwi5HVV4XUHo
Malware Config
Extracted
cryptbot
unic12m.top
unic12e.top
Signatures
-
Cryptbot family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20d4c85a6b854c3e7c7d69145a6bc199a376bf12cb1fbda2361d888c7e7aadec.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fbb9d440df9414f54e18f68afa248478
SHA146b31be22158cf9ca6c8343109272adf9bd0a4b4
SHA25651a7ae85289b5f4ddbba166fc0b1774a4a81a56e8bb508592755ad97f6db36ad
SHA512113480e3b59893a33354c10862c8af72a9a794ef27896ea095d56792e80e0fd2e888ae6d947fc91931828dd00d7db67c84c8d7b88ef8656006afb9b97a0c858d
-
Filesize
3KB
MD5c852d6542e5239877e0f6b1701699c62
SHA1d73a27dedf09d9d4b1c7f58c1e7047db1739ad38
SHA256b7392a8465178e870e8617060d2ccea776c639ddddb0c5650ec3145ef428db4b
SHA512dbd2686daea3a7d723df57ee292be04c45049fe2a7dbc0abb0bcaaf495169f745d2888c44d229ecf6e5568632324023eb366fc2a301014bed582b76ad63ced30
-
Filesize
6KB
MD583e0f0689bd03b774deec282b0af108c
SHA17e513a4e85632f412681c12f0d9535f9cb327b20
SHA2567c40f8079c4804e157b0042400789ee0fd5a53abf95e4a628273ed3efd581cb9
SHA5125124dd916f89e5c07ce29bc361c9300bee9d1348d3431acc62cbb5b7fdf74fd2927561e07553e04ae6e22280add2db2d8932b258ac053e040e085e5246d0cf88
-
Filesize
51KB
MD5b12da8e3c522b6904de0a3163f8b3b2e
SHA12757fd8b701a80f10fd5cf3bc5c7fc399f5a6120
SHA256b4b671d3fcfcee882350d91802a888025c585194db7dee2b4c65f31360b69e27
SHA5122731a16326d4d3d3c891fce8b11e7e656b05a7d67d4292e86cfb36cf2843c66d0d6137028244d21d45fd0853e88d4d911c2de8ca90da663bfb73e3a5cae09732
-
Filesize
46KB
MD585adb17092fba1a8a6f48ad3d6558f81
SHA128af13522311bcfd41f29c887fc3b2cfb7346275
SHA256d989c9cac33a3a1b7ad80f16cea47142e872f3b067f674cf21b12cf88400e46a
SHA51223d1fac184c9bf9bbdb56ee4e0cfb0c3169bd058acb13b9270dd5110033e70bf1f0c0cc4337b9559e0e5201ce364b0a2e290f1d1e4c9f8e061f0bda03b1699d4