Analysis
-
max time kernel
130s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe
-
Size
196KB
-
MD5
cddc5c06430bd9f263365f2312f72e63
-
SHA1
48ab256d4e12d9acd1a587130eff2fb449b666ef
-
SHA256
a7d7721a812df20195b6694c57c812e98335dfd924e324cfed418ef2d66fd2f3
-
SHA512
1a518d1d35fe288d4bdceac5318b33eefc35a4547eb42bc3f8ac0fcb7cd64ddb361ae36c29796dcf8a003d6977c23a8402d8f78f24c09d0d5c69e327ca566fcf
-
SSDEEP
1536:3U822+DCDXZ+srLlmvNJE9A19TITn13W4eMcf5WixT1PT3z10eGW:uDCDX7loNG9tQ4eM8ThT3zd
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 cyclestrip.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE cyclestrip.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies cyclestrip.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 cyclestrip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyclestrip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyclestrip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix cyclestrip.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" cyclestrip.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" cyclestrip.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2732 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe 2732 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe 924 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe 924 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe 4656 cyclestrip.exe 4656 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe 3528 cyclestrip.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 924 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 924 2732 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe 89 PID 2732 wrote to memory of 924 2732 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe 89 PID 2732 wrote to memory of 924 2732 cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe 89 PID 4656 wrote to memory of 3528 4656 cyclestrip.exe 91 PID 4656 wrote to memory of 3528 4656 cyclestrip.exe 91 PID 4656 wrote to memory of 3528 4656 cyclestrip.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cddc5c06430bd9f263365f2312f72e63_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:924
-
-
C:\Windows\SysWOW64\cyclestrip.exe"C:\Windows\SysWOW64\cyclestrip.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\cyclestrip.exe"C:\Windows\SysWOW64\cyclestrip.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3528
-