Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe
-
Size
177KB
-
MD5
99d397aac5d403a4f8ca0e94a5a4793d
-
SHA1
92aed3a5e1b011a3688de504f24f5703754aaa8a
-
SHA256
b8b6f794646b7839e2e65a6b241fdd02a63373be3706672ed5684cf594611f7f
-
SHA512
2dcb6b18a050c2fbb127300e42ba504c68cf9ce3394abae6d55c5176ccfde42565e38c6d02bdff6022ec72afa42809ca182cdcd87ef03e4f802fbb8c23f077e9
-
SSDEEP
3072:VHGuZBKl0neRybgnEF21PbSLtmdQ3IeyWHfFpaz5BeqSSLjig6kiEoD/t9v:V7ZcynBB21omdMHHzYJxjig6kid9v
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2520-15-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2520-13-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2500-16-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2652-85-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2500-198-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2500-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2520-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2520-13-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2500-16-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2652-85-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2652-84-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2500-198-0x0000000000400000-0x000000000046C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2520 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2520 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2520 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2520 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2652 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 33 PID 2500 wrote to memory of 2652 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 33 PID 2500 wrote to memory of 2652 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 33 PID 2500 wrote to memory of 2652 2500 99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d0f5a9e0d5af86ff78a3d34386b5cc77
SHA1bbc9ff154b241eddbea69d2889bcd00efdb1495e
SHA2561ea7ca9f6f863cead75ed04dd03a8b006f3f3d4c8f2d772c03d0ddb1efafda9f
SHA51218ca6c1f00d62c5074a388d263d78ae4602d235c39c3501c2474ad4c5f53a6dec3440f300906f02f6a191acfcdcafff5261802dbf39a4308e1dcc15f03e43b8e
-
Filesize
600B
MD53b8de13ac1a4d0e00d8233b026c6ad83
SHA1dbd9942df5dc4de5404934bc1216b50c4cff0306
SHA2569d8bd526194ab2e993ae73337fba4fb89e4c7e486126c7a5bf4c1b7513d14ffa
SHA512d37e16ead4b5946b3dc7c017169aabd764d66301fa47770e8a58cabcb09cf39a6f083800e675fc5a87d00670a6948e8e0f4566f490b71c33a9bddf6badec54b0
-
Filesize
996B
MD551b4264d52dcbd79e19f609b67741637
SHA1d4d5ec41ec085bdde993a4a0e642a6ede49fd132
SHA256a775b85ccdf7377d2bff9a686fa57079872cb3d7da8b0e52d9c423ee187f9aaf
SHA5129e142908c3116b5661278c2ee09d35526699886cbb19317becbdf18114d93c5aaa6c095f75d1bd9e4e3248449d267b6079fa81b4d71a8beab16f9b52d34b17cf