Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe
-
Size
208KB
-
MD5
d61c9b8e17d0cc069c4b60999b812c81
-
SHA1
4a47a01ea65f6a50ad68eaa3413bc8a5523d5dc7
-
SHA256
b578123863060b0f17c6773b6deb5467c17e1b6c04f7ffc4e33f45a499030adf
-
SHA512
797f7aa227219f647f34746af9565c18026f18792df51c3486713edc23aca8874fe24c330d162a07d7c43a2466f8e83281733fe266340b53135c95b5e9b3334e
-
SSDEEP
3072:qsIbkttKFHyFeKLUVGGKusRLsLHahgKNJXtnuwrcemxkr186pGJ6PIsjCuuj2HyV:FViHue/DJELSa3HtnuwXkXAijGbjl8V
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2912-6-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/3044-14-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2584-74-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/3044-75-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3044-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2912-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2912-6-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/3044-14-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2584-73-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2584-74-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/3044-75-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2912 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2912 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2912 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2912 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2584 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 33 PID 3044 wrote to memory of 2584 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 33 PID 3044 wrote to memory of 2584 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 33 PID 3044 wrote to memory of 2584 3044 d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD515801956adee1ead4470b7747840cb10
SHA1a6c57c5921619f2fe55e4ed5037f4cbbc1060366
SHA2566bdb5b8ec29b1c0dc1d290628e990cd20afa360522ea8d8e237fc4781528545b
SHA5125028aae78bd3248bf6645350c7b9f35662753a89701bc57e803db09ec93b58ef1b1fe136af8b1ea0dc68547d9a1f4d26effdb9951fac27abfacbf11284218412
-
Filesize
600B
MD5e331aeaddfe6411af7649825479fa9c8
SHA194e93745a34beb94b178e3b94f840fbd6422c101
SHA256c0041c1d6a5c4d2a6bba2723800a7a024050bce27e8b2ffced3647bbf8ce88e5
SHA5128b2e5ecdbd92b1b34d0ef3800ddf10555f125d3a2d24d374a76f1dae6885d2cb88d9df7f1e2513f3b24012fb6fde541c111959a2b19bc31a173c8b2907ca5965
-
Filesize
996B
MD537ebacf99f25a2e8fa2121d5432b31d8
SHA133e7601ec8baa99e70dd230e9a6941f3c5d02c9f
SHA256ad662df9b6c0fe26c0f200c6d706e41f7c58101a3a4293765caa7d8fcb058bb3
SHA51249b42955377d569847c4df1e0d6a060fabbbf85fae4a1a78a34e05c0b1116527b3842737b19d9b03451146c1eb241bb3c1c2680c6d55f92135ab2974c6c47243