Analysis
-
max time kernel
140s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe
-
Size
182KB
-
MD5
9f204ac520b43d2fc0dbee96e0c9e287
-
SHA1
b86fd15f81860eee91943ec4f5eb65a2cb159ef2
-
SHA256
ee7e8d3c67a034dbe7196d4f01e7ef9006d87ce1dbb577cdd9d148516012487e
-
SHA512
472ae72c15a3418b26395e27b4a3e44c024578fc6f420242edca5486c78876f04561d87e399896dbcc11af67d67d8ae335381d15e70559299148c308b9761364
-
SSDEEP
3072:H2Nu+u6t71AZkPRS9HNv0j7d5bmiolHJybr7vbXr87sLL3dwr6h3FDnHj9l8V5J:H2VWcRckOPlHJYr4sLyrC1D5eVfY0JF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2272-13-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2272-14-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2108-15-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2412-82-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2108-83-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2108-189-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2108-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2272-13-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2272-12-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2272-14-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2108-15-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2412-81-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2412-82-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2108-83-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2108-189-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2272 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2272 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2272 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2272 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2412 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 32 PID 2108 wrote to memory of 2412 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 32 PID 2108 wrote to memory of 2412 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 32 PID 2108 wrote to memory of 2412 2108 9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50fd21b2d1ee5d807505702039f9a7727
SHA13ca53bc51c8097540e73da9d3126257a13acb1d7
SHA256e47ce23f0819e8f6c5026793b8466d16afac1991201f4f5e0af4c03c7cf0034f
SHA512ba6b5d96279316dccc7a04a7507fb5d22e96dd135224f40fb56eca89955826957eba6075f00a9b625be8e6258a8eb8c76aa0fd3941d68960fc429fc09ba06ce9
-
Filesize
600B
MD56050266dd238070a0d18a9d2c0ff4a77
SHA17f79772dd9f799543699c998a75fedc4ff8294bc
SHA25617dc948dccb4f83fce9d72b3c776a6e256f8f92248c30a86f950b6454b322436
SHA512fe025cdbf1e7cc3eccf13c493e41a749766d8f5497bf37ba3b047262b40160f57af0c6c89a29c41866b14867c99c3d1cb07cb9cb1c4ac57c5a126bacb2ab5a88
-
Filesize
996B
MD5d0bf6cca7a36c1e98077b25c0b5f6d6f
SHA11349becacc72e253b4e91219c1c93c4158a4116a
SHA256db3897cc6d6030b605b6414c94d8dddd94ee28a74885e5e55bb2a74544d1b635
SHA512fcb07b1cbaacdd3cb5625016ea6d395f0503b56a78b51338ab07a7853f595eb0d141d3d6691fe0747e46e1b41a2937758746769d206691045cba8858d218dd4f