Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
da57048d65216584acf61da322e502ab_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
da57048d65216584acf61da322e502ab_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
da57048d65216584acf61da322e502ab_JaffaCakes118.exe
-
Size
186KB
-
MD5
da57048d65216584acf61da322e502ab
-
SHA1
3766d2520573dc2448f7a6eaa471f0a163d12d6c
-
SHA256
40d9e0fab0717b03700dc40192719bd3980a26316f54051ee3803cb9f310d150
-
SHA512
4afcf1f70a54c2da2a771db0a970bf92230daf624289b40399b126a37c18f06649d3c3b4415fd3b4f963e34ea7eb987f5fd1ca01ed43e532401aa242d584fc6d
-
SSDEEP
3072:bcRvZp5tU0pvdjP9Ej5nVeSQWW6RojbQnemiJurgoqK3cMvNQ3PDJ/hWefzu8yx:IRvZtpvd79PL6Rib4eDJDKDvNQ/JhnzI
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2576-7-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2568-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2568-78-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/1948-80-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2568-169-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2568-175-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" da57048d65216584acf61da322e502ab_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2568-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2576-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2576-7-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2568-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2568-78-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1948-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2568-169-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2568-175-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da57048d65216584acf61da322e502ab_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da57048d65216584acf61da322e502ab_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da57048d65216584acf61da322e502ab_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2576 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2576 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2576 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2576 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1948 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 32 PID 2568 wrote to memory of 1948 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 32 PID 2568 wrote to memory of 1948 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 32 PID 2568 wrote to memory of 1948 2568 da57048d65216584acf61da322e502ab_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\da57048d65216584acf61da322e502ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da57048d65216584acf61da322e502ab_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\da57048d65216584acf61da322e502ab_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\da57048d65216584acf61da322e502ab_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\da57048d65216584acf61da322e502ab_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\da57048d65216584acf61da322e502ab_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5f9fef3aee6fa6b49be725a8c4b6ffcc4
SHA17fd33952dc57c3174cd7637077bccba71dee6227
SHA256f7dc648878c8af11f62620d3bb7b715c0f206d1e72a76be3bd84ffb1e75f0524
SHA512da140cadaf1bbefbb60c03b919155daed8270c880f41a413a3c607b2f8f80c6c28194be6b9aaab349735c6c030711f2d984f00bfb8a5f3ee7138e913ac16802a
-
Filesize
1KB
MD5aa7670d18a6e5bcf5ad491834d3368a7
SHA1e0172c07db850544862c9b740e208427f527bdf6
SHA256291661f6c10508666f32b90deca5e50f3c86eff2bd7eec0d799bf3160d759889
SHA5124854155b2b1b9f8a9c66d53472c19321ae10da38a68a2fc85a05a3c47456fb969be0ddaca06ce8bdbcd00a5d3ba2f02fd0bd9982baa2633f7702b3ad0c618fd2
-
Filesize
600B
MD5df4b2467792fb4b7df4a174d3f9763dc
SHA1d47cb514961e8f46b3b63437f851f056b9ab69db
SHA256b1309c5becfdea0b88cf77f4fa89ab100887908ed8795fe1a8ddb4282f2b034b
SHA512ae99899b2fe7689dba9c058ea769a5bd4ca6f1f7e898c2645c465cd7d65bddeb99ef3f81ef89aa44ff2a7ab8b4afd508a76295443b4a5b5c64d300b4cdcd96cb