Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe
-
Size
182KB
-
MD5
d80febbb809a82278e7575c633be76ff
-
SHA1
74786876d71d4a66d011c8dedc52a0c46a06bce8
-
SHA256
c4bb922ff26e04fd6d30248faa50f8cc5d5da43f4dec108bebed332f1a358eeb
-
SHA512
e83dfe41d08a400369bf5537abf1e236a8bfd9ea2d7a04546dca2e037a2decb4767b58b73bca6aed88ea9bab4ea7901cd34e497df578129dec80aec41ccdb867
-
SSDEEP
3072:qSv0Vo4ONwZeAL6+is5vZZG2JmxAkUAdcWqzNdppMa5nvbM12OAB:xQXunsdZZGCmxXdxnkM12O
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2112-8-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2476-15-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2476-79-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/1912-83-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2476-84-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2476-173-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2476-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2112-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2112-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2476-15-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2476-79-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1912-81-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1912-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2476-84-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2476-173-0x0000000000400000-0x0000000000466000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2112 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2112 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2112 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2112 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 30 PID 2476 wrote to memory of 1912 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 33 PID 2476 wrote to memory of 1912 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 33 PID 2476 wrote to memory of 1912 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 33 PID 2476 wrote to memory of 1912 2476 d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\d80febbb809a82278e7575c633be76ff_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\d80febbb809a82278e7575c633be76ff_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d80febbb809a82278e7575c633be76ff_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a935ab95b23147cc368c0c86a7b8f58c
SHA153703deb41278e90ee0092cfd78848eb6a28480d
SHA2564c96a794a381002763a56993558300339a02e12d197807cb9c3a83a4b2f97763
SHA512f1d5bbd726008dffc201cd91a1b6388b649b7aea4c895d3817b6f21f1f1e8097b32aa4f3d34e81278eeb8297140c24ee4f34ae889d56c47656ec727aa8fad64a
-
Filesize
600B
MD502c3940fa5dc44852fcffefb473c9667
SHA17cf674b836c8b468db53dcd32b2aa1912efc9248
SHA2562ba5ad38206bb1678b03a277b1a2d484fd3761d053d0a1c7e28cce2364778983
SHA512a9bc3fb5e349f7c7be3992aa7d73e249696734c2f8fb489c169f1ef2af1f21bf66dbff53dcbf6ad0cdd619bce0c2b41e5e7c6477433f1da1c7c4072cba8b7d86
-
Filesize
996B
MD55641690b7312318b479cd8f81782a21a
SHA12ed08efe578ecc0241c2e222c29a6dc56f985caf
SHA256c45f12222ddd43d2d764fd5d94adb1a22cf4737a21ab565bf34f8a897d021fb0
SHA51285a118cdcc38daca69c9f1f2448dbece48a8fbbfa0cf101e2d43cbf75b0ee34bc56d31ba8de2671e72fba1674c80c168ff21cf69f8db203f45b9cc1e0c397224