Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe
-
Size
171KB
-
MD5
cb175fcf43bb0f07227ed60c03b7d4da
-
SHA1
ba04ded2d6f0651eff238736779830fca66adaae
-
SHA256
2b31e369ba3cdbd27e6b3ef96df97c1806bf9706f314b8eacdc8d0c3367aa480
-
SHA512
b3571444035b30e55b18c86d9e0cda0f68566ab60e174302e32f6c177b5f4347ae3e0f024af58c8a26d43e797bfe6e525e6d7b12831063ca51ecebf3be85382b
-
SSDEEP
3072:4cDdvnrlP7DZKO3p8tZT8uex1P0ofhTe8lcGcGKvHfYm0Yp8X/ZcD/Cs:4cDvP7kUaZe/0oUGcbfwdfXmD/R
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3368-11-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/1996-16-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/1996-73-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/2268-76-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/1996-183-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1996-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3368-9-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3368-11-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1996-16-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1996-73-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2268-75-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2268-76-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1996-183-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3368 1996 cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe 85 PID 1996 wrote to memory of 3368 1996 cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe 85 PID 1996 wrote to memory of 3368 1996 cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe 85 PID 1996 wrote to memory of 2268 1996 cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe 94 PID 1996 wrote to memory of 2268 1996 cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe 94 PID 1996 wrote to memory of 2268 1996 cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d15ca19bf2118bed315cbde3e1a0ba75
SHA108c0b3c0a095d3fb25a16fc9c2f8f4582bd79957
SHA25660afe1d27021a6490f3f61ea3a1368a03d35a66923cb9f798ae9ec8ccaf00449
SHA512c501c888f84336c18fc3d4d770a8e5606adc7cae3af6d03eb3441914437daddbb2b6e9574253e401515d337d6b614ce4ca393d54069d9efd84947f406da94e03
-
Filesize
600B
MD572926a5c124f6e42181c55cdccf5a055
SHA1bd4dbb5cee51f73ddad3f48a355ea97df338f8b2
SHA2565810a4a2ef2738668d7173ea54c8e3ec04cbb7c9533df1db0bb2efa9a9d90521
SHA51216a104662f917919bee0808ab904f164686af0567a1f0a3250a2659c72bc43899849d9d3e0e76630e336bf1d834bf6457f75ccc7c316753d860c1996628e1e83
-
Filesize
996B
MD561216fc7929a6c36c5cb50a47b9fbc00
SHA101600a87d5450784954e8969d3e9ee410f1dc867
SHA256c596972be8487a6672f6f273624c0fbb468b13cbce0cc051cc2444b77a3c3303
SHA5128b37fb1200b4a6eb7060b48fb306187e34902edb6ec499019223eed870a9e3f450704cf6214d20f6461416904683862073ccc571e3c1719831efc9f1dc9f17d6