Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe
-
Size
194KB
-
MD5
9cde8a5dca13bcb95189dfbf7a7eebcb
-
SHA1
c1b3a2eab1667e7ef64608a6bc26d0fbc5d98ee4
-
SHA256
02c7c5e8d0668fc497d038ee7a40459fa808e0a2043523a8012ac5a6e902fa5d
-
SHA512
07e04af4235a595075e3d8babc59ca9903c06be809dfd47be9c8813f5eff58fc95c48d3e9e7cd4ac162eb7be53d2e936b6736cc74199ebb729f9e27bbc487d8f
-
SSDEEP
3072:c19J68QZBtSvYnyvs3BBmiqktLSnzFtLhLSNDOBiB1tAclDrV0M2le0GV:cptQZBzyvsxE+LyzvhmYs1e3i
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2952-8-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2336-16-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2992-81-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2336-186-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2336-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2952-6-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2952-5-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2952-8-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2336-16-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2992-79-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2992-81-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2336-186-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2952 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2952 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2952 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2952 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2992 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 33 PID 2336 wrote to memory of 2992 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 33 PID 2336 wrote to memory of 2992 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 33 PID 2336 wrote to memory of 2992 2336 9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9cde8a5dca13bcb95189dfbf7a7eebcb_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD588d12f7ecef616f450c9d68313eee30f
SHA1f0ebc571ad9470d6c1c4355c2e6aa80b9d9046d7
SHA2569435147f9fe8f7d744b7553a9c7eab6a74aa01ed04edea16100f3e84e3edc00e
SHA5122826a23019a3fd0239230dffecb1d83dd210f6c2f372b1790052c3df23e506db3765e597d592c0f1e0a62b57bddc2efe927c07bfcc86efabc1b5a844ccc60192
-
Filesize
600B
MD5316dc8f952f86ab219587b0e7a1e0e85
SHA13a1a3e0d51ef27a270995159ed7cfecfcacfa9e2
SHA256e5782d79204c6e6e51e9fb4a14fb037441a3417c38a2000d30048d0155fb3218
SHA5129d5645fa284da57c3bdf44204cd6849cbc06354aee2558c3308896dbd51a5004515e0a12b33e153a7f5accfbf03c0d26a47376a87a3e1f2a465d5a4309f5472a
-
Filesize
996B
MD55462857a8518206d0df08a58edc82416
SHA13823ea525763adc1f2529e126f1e3a126a7c3957
SHA256c7f0edd3ad9d865e59353453e46cbbc3a31cb234199b68db77fd83fc080685da
SHA5123a283ea77de75d884bffd7de8d91544696157ff7d8f3ed1e27a0eecb339ec82ae5a2d9473d94ff9dd24f64c39158ceabb0520d12c755c8a9b6a53986a47f547a