Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe
-
Size
179KB
-
MD5
d40e8015ce119841eb6489130eaacfdd
-
SHA1
2a5bcc889280df3249bf22200fc969b199e54d52
-
SHA256
7f82e7f2f03ee985f9068c54e391c4f062457ff057a85ed82a116e53930a2677
-
SHA512
5b37fabd4e810173b734f3b8d16f63b9e5300bf594e90dba864e3dcaa35b7557aa66862f96111f6e085c0a40e505b7d1d534a8592451c3f52ec427343d3b477c
-
SSDEEP
3072:oPUgmwFVcEjO+A+Z/y+xVXeLOvUx/NmWNQ4bqhsaobN1FrlwtcPHdIDYzEEyh9tm:Oy8jO+A+VxVXeSvU6WW4ehsLRHrlDS0r
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2168-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2128-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2128-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2684-102-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2128-273-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2128-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2168-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2168-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2128-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2128-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2684-102-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2128-273-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2168 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2168 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2168 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2168 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2684 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2684 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2684 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2684 2128 d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe startC:\Program Files (x86)\LP\2C0B\619.exe%C:\Program Files (x86)\LP\2C0B2⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d40e8015ce119841eb6489130eaacfdd_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\B12B9\6AC2C.exe%C:\Users\Admin\AppData\Roaming\B12B92⤵
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD587ca3caf613b6fe11c5213014e3a2236
SHA1816545e85acf5f9a7d071696e2fff960445dd067
SHA256d74f13da46a91fbff13f15dc5c0593f0bff7335499a91a2244409809270c536a
SHA512b8823b22d074f54c275ca5acd377488e4b18cb3b8120d690677c5bc0fc00cba3d4f5e5cb5d74af582384a0f0340d87469c542fbe09fcfabdb9bb8336f9636e84
-
Filesize
600B
MD58ec551c4651afbd10adeed2e1ead19d0
SHA100262648f03dac20750e0072c5bd9d8741ac6bd9
SHA2562d137779d9468ca9cfb64d5d3b5fd408babdda75baf8dad2e6506548ffbadeff
SHA5121839f87b2487e1637f6d04ada371780b77789d71d1a7f7b90a36a07dbcd43cd65d7e2c313115428dd86ecc5c42f5713feb656d29c053acf0b8ed186286d71671
-
Filesize
1KB
MD5bf029466558eaa571f97dc14d0d91cee
SHA1ecaf1efe8cc8f7541d47fe3839cdb55a971260ab
SHA256735c73108181eacb457bba223b1cf2b0159eb345ac9416041a6fffdbe802f8b0
SHA512da4ee73e8a8b868363b4f249793eb04a5261dade0aa26c500de8dad0a9ff1e86c3f8c084723c84511bb395e4edb7d21ac9b5c088518dafe58c86125651040ddc