Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
-
Size
180KB
-
MD5
9576ced894b1306bb46ea64e5e3cc1b3
-
SHA1
b0aedd64fd52a19d80df3381df1d3a2ff0fef3e9
-
SHA256
bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304
-
SHA512
a9caa0e61e5c356ef79bff9223e1db1a0a6d40690d7b59a601230c0aa2434bba90dbb7035d9e0d90ba9339e6ab79826d40f5c576c77288252119b6f40936c275
-
SSDEEP
3072:KEVm8FDMBRQW578SzOKdImBUdkDnnzUn0e4TZAQEjaPHEG4hJo5kLctnYZst6AZe:1NJMrdJ5dImBKckD4TKaPE3C5kLctnYn
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2812-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3040-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3040-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1948-111-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3040-294-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3040-295-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3040-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2812-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2812-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3040-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3040-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1948-110-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1948-111-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3040-294-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3040-295-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2812 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2812 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2812 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2812 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 31 PID 3040 wrote to memory of 1948 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 33 PID 3040 wrote to memory of 1948 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 33 PID 3040 wrote to memory of 1948 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 33 PID 3040 wrote to memory of 1948 3040 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Program Files (x86)\LP\1DBA\A42.exe%C:\Program Files (x86)\LP\1DBA2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\A11D4\1F41D.exe%C:\Users\Admin\AppData\Roaming\A11D42⤵PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5070609139c94851de25e76093e59b98e
SHA11c58f3b7f45f82bbce2ca08964f98cd9f4fa9900
SHA25645eab3ac7f25dda9aeb911c3b2c1ed50d6ac9019cc0401735eb0a1dab7fb41c4
SHA5120db1a7a5667f7ca009bd46f52432d7393fc258135d5cadd44fc9b0d0f572deef8409dd0830ffd461b2d83b3e8c3d6b8567532fc53d1c337e0de0b3c1f96c03c4
-
Filesize
600B
MD5764c11d9d4eed091633693307206b17f
SHA1a33bc7ec967d3732b699a6dadbf9c4b8b937ea5b
SHA256fa3d19d213ef4268789a62ba6c46168e9e82ce7c262c99dd25b7af662d22a9ca
SHA51231ebc59b7e55393615519fd96a54d156762ad2df90e13012d8e3d01e0c703fd5dfea83833a9e7b158915a2efbaab3534364e981bf247bc2e818046e94bfe41e0
-
Filesize
1KB
MD5ec1d156630444c1a6e5c0fb431a2fb0c
SHA1759887064b6057993911c8b7999ae2e981621ff2
SHA256af08e738084900c335bba50a595652983f750b3ead87e270767d4d22b2e6ed85
SHA5123b1f205af74a22f79a62e3e2ea131471345880d9c022e29e082b4d6dbb96f77150b13004565ed3f5f29ef4eeb03a408b0066931b64cbb2e65f0594818f578071