Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe
-
Size
167KB
-
MD5
d809c8711fc3d906b79a0d80e3b10461
-
SHA1
c9d5781376f572f7f0c06d6048bbeef76f853187
-
SHA256
93974daf245cf75829a16fd39adb7b8555ff9b319c07759c7393d4994e6a0168
-
SHA512
b14badbfb2fffcfc0e74ee7cd421ca01f4ddfd0e3431e544a12f63993474d803930cbbdd954f4c530be037278a424fd75f7387fac1a33f2dc9392c3f40535c61
-
SSDEEP
3072:lxOvJRcE0srzPNzoS0duNOx7ksl5oyAvEyIIWXIpRe6gta:IJRcsrezdu0x7km5oyAvEjxcgt
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1940-10-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/1940-8-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2424-15-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2424-16-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2424-77-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2764-82-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2424-191-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\7921D\\F18BC.exe" d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2424-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1940-10-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1940-8-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2424-15-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2424-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2424-77-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2764-80-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2764-82-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2424-191-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1940 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 31 PID 2424 wrote to memory of 1940 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 31 PID 2424 wrote to memory of 1940 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 31 PID 2424 wrote to memory of 1940 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2764 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 33 PID 2424 wrote to memory of 2764 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 33 PID 2424 wrote to memory of 2764 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 33 PID 2424 wrote to memory of 2764 2424 d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe startC:\Program Files (x86)\LP\BC47\455.exe%C:\Program Files (x86)\LP\BC472⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d809c8711fc3d906b79a0d80e3b10461_JaffaCakes118.exe startC:\Program Files (x86)\1D83E\lvvm.exe%C:\Program Files (x86)\1D83E2⤵
- System Location Discovery: System Language Discovery
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56062843d93ac3b97e93684c3c15fc2bc
SHA150a062e80326754bc1d604bcf31c7664fe7496e7
SHA2563efa64b7887d90fbafd2bff5b8d8730a5e4841b99a489c8f942cbe9ad13223cc
SHA512a4a3dd111231663459afde4cb9759f288aea181f55ca83594c4802ed86af777b953d163ab98a326941dbdd46e80b0ec7ec16c327fad29736047945ced53a357f
-
Filesize
600B
MD5a54e1ac047a4bc154580c41334091f8a
SHA1bac8dd06208deee883c8b94971f86ef69297fe51
SHA2561925907cffc040be922f6018f0835c6f6bc831b59545345290547a04b2b82df8
SHA5123b402e3f515b1ea51a6a2bd588a21788a2e281c41eeca6185ef40f9d01ae5c059fdf235ce6ef1026f55447edf4cb92b14c6ec89615662d275a97c0e79135158c
-
Filesize
996B
MD58ddda75ecc2af23bea5f590e3173c920
SHA1f2ecdca99f0a761e82fc30e384703cea957d01c5
SHA25613e2e2f0c9dcbd019f15230ccbe891c983595c96e3444bc4356940157956eb8a
SHA512aedf3f33b7f12f83701885b43b2bffe8225875239494f13106de1518ae033017ae92a55a70815b6ef1b5753dc4d00583b5e055eabd1e87e6407e3e17bf6d0b1f