Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe
-
Size
180KB
-
MD5
d3bc0aced11fcf63e0b6fe19a2aeaa2a
-
SHA1
cd10a0bc51c3b511c8c2d60eb62e4a7e76f0a333
-
SHA256
b5196f1a6850fcb8e9cd53c781a5833aa6b8b6b94f63af4bd93404a83eb46f8a
-
SHA512
c1f012142785464ffe32545487a3c8f19e694229fe3578091a9b3ae9058913df7748031f756b09d750dc8cedaa290da3b6b62b033213acc871fab1ec89143e82
-
SSDEEP
3072:FqDztifjcS0sagmzaYvCtvd0u7a/VJo6EuzOfXJovuqt5T3l:F9jl0ZgOaYqtvKeAw6DOfJi7
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2724-10-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2724-8-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2076-15-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2184-85-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2076-156-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2076-197-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2076-2-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2076-1-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2724-10-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2724-8-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2076-15-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2184-83-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2184-85-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2076-156-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2076-197-0x0000000000400000-0x000000000048D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2724 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2724 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2724 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2724 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2184 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 32 PID 2076 wrote to memory of 2184 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 32 PID 2076 wrote to memory of 2184 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 32 PID 2076 wrote to memory of 2184 2076 d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d3bc0aced11fcf63e0b6fe19a2aeaa2a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59582652ed1395b002758793d624fe3fc
SHA1075d7c72dd6d17d2fa5f9f80501dd45395568664
SHA256981072d9ced590524f13d0c5e32238d8dfd1c4172ab9ce96390bdd64770c4048
SHA512272731bc920397772e0e774dfdb09ebf4ab90661ef6075e5aa97d4ca5e0b40cad1f7b37cc27e1f16b5576c0e8b0fb48323f31465593baeb95a0b85cb48892b74
-
Filesize
600B
MD520f7913e392b1cbd2de552dd8fa51f80
SHA1c109f9b06b37173ab9a003a3470741c39305deca
SHA256859cbb0c322e9003f0f3898ab69ce13d5d53839c8d503032ec2e59842cd970fd
SHA5124a73069ea2ab9becd20d26242504b941f95c09c435e75dabf6f81055899caaebdfd12b84bc37355ea8360af78b337d9c3826900a3fce40086a7d730d8f1cd088
-
Filesize
996B
MD5d82c9910af99b107dbfd201510fd3ce3
SHA10da39b42e9fc1b7b506301d40b2375a9477264a1
SHA25661a4ec84a742393ab802e811e89671aa43d3a9b09d8b894af051fe0a26daa7a1
SHA512c1d7dd1d1d3c2a5a7759d6ab3ce3e566dfffa2ea25ca6990f1478c88fbd993d1e07c9cef45183d0f010d2a22d3959e8adad617bfdd78ce224f8bdcb69363e6af