Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
-
Size
184KB
-
MD5
cd1f60e33e97cfd8666442bbb73d61d6
-
SHA1
ef28dc487c4664fd5cc71bbbba2bd2d2af3ec991
-
SHA256
ca64ef74f5424656bc57a9131651785a69001634d0af0b1280c9101be48fcae5
-
SHA512
74ee00cf1026061c9bd9d1e8f6c21f6ceb626a80efcb73773b004376a8ffa3571e3dbed77c6af2f430ff8ffbcf084438a2cdabb4fd1465d8ac3fca0dcd38cc66
-
SSDEEP
3072:ZCo+5CqpKED6/yn+fz4d1urm7t0Mzkwt5ySg3hnPUJMEFwsrwQ3nqIKqKzEc2XP:Za3pX/+fzYEr2t3zkwtgJxIz9r3nqIKh
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2360-10-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2360-9-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2568-15-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2360-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2568-79-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/1696-83-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2568-198-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2568-2-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2360-10-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2360-9-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2568-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2360-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2568-79-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1696-81-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1696-83-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2568-198-0x0000000000400000-0x000000000048E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2360 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2360 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2360 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2360 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1696 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 33 PID 2568 wrote to memory of 1696 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 33 PID 2568 wrote to memory of 1696 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 33 PID 2568 wrote to memory of 1696 2568 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558eaa2b1e0c503c835794371e2d58d73
SHA13957cc6f10ccd2ede8743ffe1aefa3f2b19a0f64
SHA256355206843dd8adc3df04544102fd7526b92f81e64cb4c695ed1d633b33d5fc58
SHA512df3595aedbfd619a649b3b3b221237b5dca171726b395a25d4d4ea8342c4511ff575958adb9856a021fe52081b3b77a4f2813092817e61de8e0c4323b9b23804
-
Filesize
600B
MD5ceeddbf628aade0f81926ac08164d471
SHA1bf06907d9b1aee6fffee4848297a41de3f4514c6
SHA256105a67a2ab5bae7dd86b9a533fbde6a004b0df9b1d3b5dfeb5d602c2948067c2
SHA5122319bf8366397d3c1cacb420ea4eb8a857c36d1d987feb72a51d98ea1b14eaa51ea438f9d9f87cd33ba834aa78ff9423cce3e796b14b8ea22f69565a47951387
-
Filesize
996B
MD52e8e1be1ade811e7eea6ea9448e306c1
SHA179803f1d2004cb22ebe412999a7b97130c20711c
SHA2564383cc422e48b90f793514891224aa7bb390c0fc1bba83f0a7523af7de565355
SHA512599f234a32f81b25bf1126f9a1277c9813148abf52d4e23b757ad451e56de6d522f63f049615bbc48d9d6b9f1c22cf66bb2002904522fdd58482b0762bf76936