Analysis
-
max time kernel
140s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe
-
Size
168KB
-
MD5
9cb1161eaa5d50936df0d55924a22525
-
SHA1
2fd84ac688c09b88c8170e685db183290569a93d
-
SHA256
b6612509eac6a3dee17cacbcccfa1aaa57619bb6f593b70b6b9a29a11ba3e44d
-
SHA512
2954796a7a9cf6d34c5cf486c5aac6a5b1804b8bc875319375da00d12c6cab8cd9b07ca8312d0f46121cd614844064cdfade96e4296d0787fef1d14918f9a1e2
-
SSDEEP
3072:hTtdyCBUAgafWE20tlow3LDx1GhuyZrALlooytHBDeZd3c:hjy27fWwtL7Dx1G1ZkLlooyzDUc
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2928-7-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2768-17-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/1844-84-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2768-85-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2768-174-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2768-209-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2768-2-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2928-6-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2928-7-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2768-17-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1844-83-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1844-84-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2768-85-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2768-174-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2768-209-0x0000000000400000-0x000000000043E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2928 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2928 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2928 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2928 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 30 PID 2768 wrote to memory of 1844 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 32 PID 2768 wrote to memory of 1844 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 32 PID 2768 wrote to memory of 1844 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 32 PID 2768 wrote to memory of 1844 2768 9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9cb1161eaa5d50936df0d55924a22525_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD52322c5978455970e284aea301793fa76
SHA1442ae4e616122e3f834e585b603c3d1b11160983
SHA256fca700f7893bbe7d544a88b9642740c4d6e190b230f4dd241f79185524ee8a02
SHA512739a7ff83b4eeac3ce38daeb7140d29915210b9df8adc8a13939fddedecfef8c02a71c27e2eeba9d88de3141e5b92cf2a73f0a1755f7f8e52a8f454a2043b0c3
-
Filesize
1KB
MD513ea5014220ea827688ac6180017afdb
SHA1af380949b51e4058e7b7c6c3d2fa75986eed681d
SHA2565f2b9562b47f894c6e47e00db88e7c10389169b05e0bcbb811ae29f96c62c291
SHA512f63454ff84627205ec112fc4661ada6a8aaa762be72600a8b8542acd89b61721eb797cece535725768fe376eacc3719af0472f2ae4f19dad9c61954257025040
-
Filesize
897B
MD53f7fdae59c417123e7a2abd29006e966
SHA1dba6748cec8b4d57c7b301361f3b9b8489139933
SHA2563ec66f0224791e38f8f6f49d105482011b216bb52ece7afe774056a51137ebf3
SHA5127b476e1db36d375a23157692b2493fd702cab2b95d6c5070ce2c7ce644f7ccefe2c650b837e2788fb916e9b53d95bfa069dabe887e9809093512f593cfd0bcef
-
Filesize
1KB
MD5f53a5af1bcea7a7b3bc1a286cad14ee8
SHA123a46855679cb5db9b4930251991bc31000003b4
SHA256ed6537dbf4a71fe024a7cbb2361971f8dbc7ec711793c0f211a50324731d65c5
SHA5123f1392d28801e515a733cd0333ca10cda4e20a384194bbbf7137a46f33184a6ed7806585d4d39c1b01fdcd064e7666e38e4fe6470aeb0a3e5893639ccbb47468