Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe
-
Size
170KB
-
MD5
cddea6050815701d81b0e09d7f2c15c3
-
SHA1
34b2edbb877ac76146e90ea5e7f12063bcb57a4b
-
SHA256
dcd8c950639bd4ed17b8c9c67ea5f7590040c4a97fc55de6f56bf8276a759f69
-
SHA512
78a5a07f6fd55caf10b61922fd2e9abc9fa92cbffb01fc432450b0b03f59c0b4f4b0de8315a75aec3d5c0fe7dc8522e39838590a70aad688741b063825a14c52
-
SSDEEP
3072:J6gekefXoHjWWdif83587QVlseQ3G60lUe4eS1ZPPKJ7hN7xpuHE:o3NfXoHJif83XVlsIlUFbbPKjlxcH
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2736-9-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2068-14-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2356-82-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2068-83-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2068-161-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2068-2-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2736-9-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2068-14-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2736-15-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2356-80-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2356-82-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2068-83-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2068-161-0x0000000000400000-0x0000000000444000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2736 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2736 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2736 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2736 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2356 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 32 PID 2068 wrote to memory of 2356 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 32 PID 2068 wrote to memory of 2356 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 32 PID 2068 wrote to memory of 2356 2068 cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cddea6050815701d81b0e09d7f2c15c3_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD564a0454b75f62d42263350bb33eaba4c
SHA12748d502cf93ee069c9db05994062ec3e127329e
SHA256ea894393b9be787da66cd82c240730a3a95d3f3a733b67d8f0903d347c0592cb
SHA512db8fa9e7030ca02ac3447423fb8c3ca4bf2f1f1f8f9ccfe3ff183faaa29cb583222cf347e1f1611275a7addf72ce50b9ac211f52f8ef1e997f21c01e9fbf6910
-
Filesize
1KB
MD57c32b386bf1eb273364e070528dfcd11
SHA1a405198a01752c356df4f0be4dfa428765570a1b
SHA2561017065efb65b737299cfe970381bc651f5891ed166eb7d9199b9f87dd6ec67a
SHA5126d41e7742ac256909213f2f462655902bffb889a28ba625ee3e22cbe20083532f4a6343889ac22409f9290211e5e48756e91e123b7d8ff32202563f03e7029e1
-
Filesize
600B
MD5aaacadd7eb80310977e9308cc9add349
SHA195a8214d7663b08538bcf21541dbd911c4d54f50
SHA256af93183e432bd39a612ed23d08f8427463f10e3483e44bc64783e70d2a5f1d52
SHA512f6f8a92bd829f0b9adfb9375b67f9055fe9204f4ae8ea4d4b9f3d1b7e15384dda1ed0cf4fbe95ea60f85a886319f8e7122d645c069c5470da2eecf33dcebac4d
-
Filesize
996B
MD5b2de77f0052678e5108922ccf9866b24
SHA11e1b3483f0d54d2db3fa545e8f9530675c36ab11
SHA256df9bdcd662d7a235bae2ca3fa655b6e7dfc37f28becd28dc81984c4d323a5768
SHA512df666ae849adf1e81f84b4b0807f0c4b676462824b5740dd68ae8daf689ad8a06e9317a4fd336cabb0827f3cdb2a7b837e52553c21175cfdf8c6a86209c2aa9f