Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe
-
Size
177KB
-
MD5
ccc098c32b2f8d8bf219f2b2417f0967
-
SHA1
b0b5297e4cc1797230890c46433f22a5d7c9042a
-
SHA256
9e797e2a0e977ca727e298287a90a223d40a950f4a7126af1fbdf99e03e39b46
-
SHA512
67dfe74c2e98e57af134f5e50c95fdb500f5c1880a99087dbc4191cb2249d2f865a68b638b9fcceaf557487cd69746389f0819b617c91bd7b1929ec64efca38e
-
SSDEEP
3072:NFPzJiOI/uXX2IQO3FT4HBV836ixVe4ZojZMWutBSkaB8pP:XPzMOGuv9TIV83hbebjqWutBSka
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2336-15-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2488-16-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/540-83-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2488-183-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2488-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2336-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2336-12-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2336-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2488-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/540-81-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/540-83-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2488-183-0x0000000000400000-0x000000000046B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2336 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2336 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2336 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2336 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 31 PID 2488 wrote to memory of 540 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 33 PID 2488 wrote to memory of 540 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 33 PID 2488 wrote to memory of 540 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 33 PID 2488 wrote to memory of 540 2488 ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ccc098c32b2f8d8bf219f2b2417f0967_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5275fa24445f085208c37aefd3ba29a27
SHA1f0824fb5eefef4d3efe427ba6d0d0bc53c0abb7b
SHA256ef7079a58b83a8e2ec9df368312ab6245c0a7c1407eff95ffa6bd658140d7e1d
SHA51256e9a2d6f58e168afb881a1c98f720f8262b6d8c99993e7f465adac34e40451d0329fc62c60a671ff7437e2abf0835fb572c41a0950089c50f6a35f65e4d0765
-
Filesize
600B
MD5db934703805657d12b49675ea486c829
SHA193e83829443b5142b296047730fc537efa5be5bd
SHA256258797454ca13dde746ee2fc471361221b703ccb4f93c0eaf65f2b41ea918bae
SHA512898b89109e17b7f4312d2b178178021f360c5a917e8ca392d0c87eb1cd0ee263d2a9926e0d8baea9f36007a670eac101a9b9cd32695cb8c0a8f56423b1a67b51
-
Filesize
996B
MD512cb64b2862b4f826cf24dafbae1d63b
SHA11455f3ab6e3a55bcba5eab1821c27eb5a1f1d4f1
SHA2564ddf82924f2e79a625af3adffb11595958a590b9885df4b4950ad6471f8d9eae
SHA512931fcbc22244c61142b79427223e19592b819832eb4ea24d1b1ab44d79046f927edc018c605d616297fad47b52ddad358d13d66a6ac48914f0eb5a45196793e0