Analysis
-
max time kernel
140s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe
-
Size
188KB
-
MD5
9e77019f5abf051f988694789f9ffbe1
-
SHA1
c46c887ad44ff95f21aeaed0023115f22e34bf4b
-
SHA256
e98efe9f111fdf9c5ee94addad80e9c4721379d1184ea8af307216ac570179fe
-
SHA512
8dcb7ee11951eaaa7ff46ad81f3bc119735a323ebc8871b69e4b273eccd3e91f116c7dd09506a79e5e37450b56b727f937df6320173a8337021b2647c1bf8c27
-
SSDEEP
3072:HB3vG34roeUhHTWuIvGYuqm4LtffWGhIZKVFSkAwcEQAP/xc0qt/Nj+LYuQYceWi:HB3O32UhzWlvGJO5f+GhqKVF6EJ3+Hl
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2804-9-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2656-19-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2908-85-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2656-177-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2656-2-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2804-7-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2804-9-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2656-19-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2908-83-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2908-85-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2656-177-0x0000000000400000-0x0000000000447000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2804 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2804 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2804 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2804 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2908 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 32 PID 2656 wrote to memory of 2908 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 32 PID 2656 wrote to memory of 2908 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 32 PID 2656 wrote to memory of 2908 2656 9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9e77019f5abf051f988694789f9ffbe1_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50c8006948ad9133b17040f288e38347b
SHA1f4b95fafa49c883e28724cccd56714a3f9613d05
SHA2568f25dbe4988e6403a91d5cc0ff967ac45d553a44d9905839c009108c0ef83cd7
SHA512be79a22397e2b16d3b8aff7345987fe311b9c79661eed5430645c3ec6d99eb2d9d397f5a09c3a12d1ae5b5d95ae596e471047d8aa38da9eb8fc28eb1965c4c20
-
Filesize
897B
MD5ab82eb026a50287e0e1ccb1cec01408e
SHA1fae94efa8df4343d128f257175c810e10a643bb2
SHA25673ea6c07ac1b9195a6ce6c593d721d2c80c8d6f7a3c6d8a5e703e68ad033af66
SHA5120ca4d2b176d853406b8298a5eba0340bb944cfc68a42aec58e7130ce38c8655516e149ea99b29e5f9779c53b346f7a30d57fc22dc826bedf8f040beb713a0406
-
Filesize
1KB
MD5d63dcd5d11ddd6c1b8cdce5785fc5b63
SHA13052dd7e5a362263bf1adc728187de56b0865c43
SHA2569edaaf4cf663041af3b4e875d4c41f3381ee950ae42eb1ce9df8b60d2119b75a
SHA5129bf82ed23e45401f091c23eea5f490a809c6513643fdee0316c1133d63a7be78273f2373348001a423c14d5f120e415ab8302fc2c5e18e5d050c2647e83a72d9