Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
ce00b42308508babf890107af3114066_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ce00b42308508babf890107af3114066_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ce00b42308508babf890107af3114066_JaffaCakes118.exe
-
Size
175KB
-
MD5
ce00b42308508babf890107af3114066
-
SHA1
f26ee97eca361d00369ad4fa9d3dff9e26eb7bbb
-
SHA256
badd77727362a58a585447ac520391c35b8994bfef847d21a479667fba45c122
-
SHA512
b6afa2dc9aa31c9f5b2d6bfaf44a446b3476b9dd1a5a165618ec589e7e131cd2f7f1590fe0323228dad0175420077f7b43148e740b35ae66698be04d097deb40
-
SSDEEP
3072:MhUAPGWlyhLE0aA0x3Sg3AJL4hN08T6/CP5hLZ4OUdpAayChQ0w4Gxe1TGyUyZNn:aUiGeyhLEmZoN08T+Cr9ZUoQUeVGy7Zh
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2512-8-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2360-18-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2016-83-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2360-173-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2360-204-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2360-2-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2512-8-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2360-18-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2016-82-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2016-83-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2360-173-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2360-204-0x0000000000400000-0x0000000000463000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce00b42308508babf890107af3114066_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce00b42308508babf890107af3114066_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce00b42308508babf890107af3114066_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2512 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2512 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2512 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2512 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2016 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 33 PID 2360 wrote to memory of 2016 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 33 PID 2360 wrote to memory of 2016 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 33 PID 2360 wrote to memory of 2016 2360 ce00b42308508babf890107af3114066_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce00b42308508babf890107af3114066_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce00b42308508babf890107af3114066_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\ce00b42308508babf890107af3114066_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ce00b42308508babf890107af3114066_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\ce00b42308508babf890107af3114066_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ce00b42308508babf890107af3114066_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD507f4dffe29baaa217fbd7bc598e6e153
SHA1e711b75f15abce77bc2b51ffae5ef7ecefb54973
SHA2566a17e7c0e51e2a1ca09d4ebc74afc5a301bd0e45a4f4fcadaa9d7197326d5c17
SHA51269e02b9a0e9a9c5b092c203e9eee0d81c55c6ee5fd3b55237b1efe94cc7b78f36f09b250de26985c0e2aa3ea3d36138fb63f01cf8a59193ba4833cd5d7a1cdd6
-
Filesize
897B
MD587dd82185711a65110b223915e72083f
SHA15c10c017b956ae1adf5f72e6d7faf21f57e1762f
SHA256288bea34a2ab4d4757ab2249edfa67aba2bf2ef710bcde6707865338f1cfc45d
SHA51244f553addc4d933e6e198e2d3eed81a6c6be5abe055d1f3a6baf8f3596d486fc7f96b53c341d9d38c07280aedb83f77bd1f5cfcb65accb1b54647a8e71f96790
-
Filesize
1KB
MD59e2fcd1a725dc599b06fb41377fbc691
SHA16ec873eb530365528f1af7ab4703821bf899089a
SHA256781cfcaa15500eb8217cd183cfa0f2bb3b6a1b79ac709d4c8149fe0ef69e6daf
SHA512d39690c44823073a5d9defc192664db7aadfe0ca2b4d159a72104ec1a8af34aef35742717cea76ae28c1d6f578e8ba1842a1c8f90b4d4a9cf21c953c843658a7