Analysis
-
max time kernel
141s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe
-
Size
191KB
-
MD5
91a7222173a391b6c15ee064abb76d6a
-
SHA1
326e76baa09939b8be28d0331c8fc0649b96ff10
-
SHA256
b986ecb698196e2430d6d610d20ae40e17550fd848744ade456fdc039acd9d84
-
SHA512
9114ab0c041de194f248250e007e0a0022df3f6f821a6feee834e810d4d3c309a50109b079117e63a6279d3000c85d2195720b85dd435405a0431ac979ee83b0
-
SSDEEP
3072:OBtf6BpgA4D2LoIgCUb7bWzmIhrsG1zwO+0/i9CwqVsKKwGrQWb9lTLGaNo:Ofo4zIgRb7GmIhrbB7i9sM/bnTLGb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2484-8-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/572-15-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/1624-76-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/572-168-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/572-205-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/572-2-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2484-8-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2484-6-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/572-15-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/1624-75-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/1624-76-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/572-168-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/572-205-0x0000000000400000-0x0000000000447000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 572 wrote to memory of 2484 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 29 PID 572 wrote to memory of 2484 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 29 PID 572 wrote to memory of 2484 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 29 PID 572 wrote to memory of 2484 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 29 PID 572 wrote to memory of 1624 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 31 PID 572 wrote to memory of 1624 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 31 PID 572 wrote to memory of 1624 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 31 PID 572 wrote to memory of 1624 572 91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\91a7222173a391b6c15ee064abb76d6a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58d5938bd3a9577928745f91c34f3cb16
SHA14a62c3d95485081411901fc029eeb3bf77fd5276
SHA2561866f7b59c6bb2aca61a1f4f973f9e5e576fcd53a023d35d8199948757625560
SHA512cf047f2641c4a4251751849225980ed19060464133df595ce3b3e428d1ba3846997691ed573c83de9e1db7e5d8954c5786da621ea928188105b09bad2650f75f
-
Filesize
600B
MD5bd7d38e68fe69082f9270552c8d4b187
SHA1f16503a545061f08caf23b82f2007fc196ebdcdd
SHA2565c1b8d3a5740962d2816a7d63ab7e8623e927bad10b4e0319a9c454e66d492af
SHA512e648ec92f7f6e2633e5bfad36957d6eb59e38a6b1297a21036a2aad4941eceaa98fa5a7b9b079818f447391d58bbf87494888121b5582fe3cfa3d59e4fce617e
-
Filesize
996B
MD52468b6c4d3abf85b21bb2bfb3ac552ac
SHA116f59f88cfb808a36cd3d67ac5bf0965c4b8c78d
SHA25654e8b4c86b47d06d5994fc409866a6a2c7acd3784ea91196845d46c78cb3a129
SHA512d153b901810d842308f1065471c2fac24bc891f1f1f6bf4774adca0903d7af88e6058029c83dc90f52ca2939c0121d5b3a59162c244c782072c223fa25f2f3d8