Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe
-
Size
197KB
-
MD5
97275bf43a8a0eff3b23bd18ab28288a
-
SHA1
352a4168ef61b00b5f25d432ec3b109b0eb5d2e8
-
SHA256
dc77c3681c771dfdf2bc5471537b068655429741891ccc6cde717c571adce276
-
SHA512
71c2403b7c35279cff82d85d0ed8b8f9147a39d384fea21b88f899a75cd14e11d3dcae0c20a2bf89abd04cac1e400b1c53951e4476a3214632e44dc7d46ba61f
-
SSDEEP
6144:zF9pAsRJFmLtO9dtbeF+8EIT6Af0qWBZYKoN/XbNc:zFrAsJktQdtbeF+JjM0J
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
Processes:
resource yara_rule behavioral1/memory/2772-7-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2140-16-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2188-79-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2140-80-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2140-188-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2140-2-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2772-6-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2772-7-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2140-16-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2188-78-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2188-79-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2140-80-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2140-188-0x0000000000400000-0x000000000048B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exedescription pid Process procid_target PID 2140 wrote to memory of 2772 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2772 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2772 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2772 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2188 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 32 PID 2140 wrote to memory of 2188 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 32 PID 2140 wrote to memory of 2188 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 32 PID 2140 wrote to memory of 2188 2140 97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5770b30e00e30bcafa4abb538738b0f3a
SHA18216d151547d22fa4283340addd37b928f9ad285
SHA25682ca95c25faf1a4381674a5cfb66bc65f0d1baa395e7ac77a66ee0ec14096ae7
SHA5127fa7ab4357fe56dfe7abf10213b81f88f3fdafb8c0780f2b8c22bfb9c793f23d9121000b6079f94b94a2d378b34828c5587b31e7b65f6e6a1d35a814bdd17dd0
-
Filesize
1KB
MD545bc8ea55d0a30347440e76d62a8ceb4
SHA1add99b157151127cc822f56cad14cbf339c40f3b
SHA2561d6e7df1c4417945f5d6504f2ab46f29b56fe0293eb01eb6fad351df4b42fbb4
SHA51227669c1077b0f6277cf0dafce0b7dc07a4e9f1dae21a13dc5d35567100a782ca81c7436c731bb4a654a21736b2ae33ede9660ebe185c817d8134923c55579076
-
Filesize
600B
MD5098dec8edb26e1e1af58c85bed6fc1f2
SHA18123a6d85bad213f43d6d6b43c3750a739f4ec7e
SHA2563ba34bd84c798f73818e2b188b4af59ab1407c4a77a7ca3ac34c045e62f1b170
SHA5129493aac27190764c6e56aa3e2a81d5113637d83acf455bdc7fade67c54c714eba1ea470d7cf86335ef84197886141281991210d2a13ecebe4adc640fcf9e0ddc
-
Filesize
996B
MD55c1af7e3e8e1f10f8da0f6fc35bf8261
SHA1aac122a7dd0646db006eb67848147603e2e930cf
SHA256aff759809c1af810687fbd6e4fb3e8fc5a0e300dd7abd1e037fc31acf737c9c1
SHA5123dbd247f64c9d9f10da2e3e1796889cd17fb1e059e331b57bd8090f0638cca0ddbc30816fc6712c835ee2a67f0dbad555e742b1f90fb3fb36ec26e56e9f44d05