Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe
-
Size
169KB
-
MD5
9d92fe3acbdc5b305c88dbfbc35fa860
-
SHA1
74c8ff6afe4cdbc427c3c7120ebd4126f56bd5ac
-
SHA256
b2942a6f0c86649e5e35ac6a5e1748c953a87c7c27e98d3d6707f22125bba19d
-
SHA512
786116db37f708f23e8d7ff639d270e98a8f91795450f7cae3b61bdfba13c84e9ed20c3b909b165c3dd641854fcb08a431a889c65087d21c1732b75bd9ad3d0f
-
SSDEEP
3072:eZckfPFOLpIk182brq4vAvG2X7j3bgSr7DHpKWxZ7PUz:4cuFUIk182Cd+o7jrgM7LpKWfQ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2680-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1964-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1964-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2892-78-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1964-79-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1964-185-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\5278C\\04BD4.exe" 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1964-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2680-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2680-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1964-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1964-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2892-78-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1964-79-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1964-185-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2680 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2680 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2680 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2680 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2892 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2892 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2892 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2892 1964 9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe startC:\Program Files (x86)\LP\D4F5\F72.exe%C:\Program Files (x86)\LP\D4F52⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe startC:\Program Files (x86)\8CA61\lvvm.exe%C:\Program Files (x86)\8CA612⤵
- System Location Discovery: System Language Discovery
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f940e44677ec6f3b549b8506e2b69ea8
SHA13cb48eb3e6f066dfc08f49d66ac150d52c4b14be
SHA2568cff114801e26fe0145c7ad6cd3e9c0a8baecac40d250e02d1af5750d2b178af
SHA512902c9108a9288ccbf1dafebc129100168ab45a64c44acd8f95e6b2b8ae5ad4d315a26d1f49382ac63c11acedca36069d7a619d4fff37153167d674adb281c991
-
Filesize
600B
MD5e8081fbe641d04bdb3261aee5a98a482
SHA1f0ae84965919127f77bfb2a9f2c931a2edb07232
SHA256aff062eb4534627d5287756c53c7413f1891c3a8fa8043c1b910b6f09d21d565
SHA512915fd65b85652b2a23458ab9fb62891f97519debff0259f1bb5b3424dcfbf1a5b23452722f60700a6761b7d62da3b9d699aba4cee4fac42a0bb6161cde923ceb
-
Filesize
996B
MD5af2602b9e82914130c4c9892d6fe6d30
SHA17a7c0ed1ccdbe97a68d9d93521c0ef7542a1c1b1
SHA256457d0bd83417b73a0f9e1cf21656642771ac507217467a3ce7d0d642d1f49a30
SHA5125eb1cc271bb6e8ac658187ec0a5452c6d57cb0748e9eade6cf822625bcbf3f4402a47a42119192fb1ec8fb6476bc9766caba992b632c513ae5fe29c64bd433c4