Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 04:27
Static task
static1
Behavioral task
behavioral1
Sample
dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe
-
Size
167KB
-
MD5
dd017e7b0351d853bd8520ea9fb0f7b8
-
SHA1
05a9404e835949f47ff004a8c177324646c8cb98
-
SHA256
ba40f29dca7b3fc768fc817d827c69a72073f90fcecf6c9633346f87a4567903
-
SHA512
4f991f87ff1042f33ef51e50d0fe779b8b31ec218db85433d6416d1936938d9bb24a3799f27b8a9564020f48cb35e32c10e2ffd22c7ca09217d8e5a6c6aa9a00
-
SSDEEP
3072:5ndcmKmr9bSEfya28u5xSQPeuVvQIe88KJoYqk3evgQkO6zc7f39tHHtdaCzpkx:5dc1m1Sa8yQPeNHKJo3yQa8/aCzQ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1376-8-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/1908-18-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/2456-79-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/1908-80-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/1908-183-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1908-2-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1376-7-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1376-8-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1908-18-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2456-78-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2456-79-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1908-80-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1908-183-0x0000000000400000-0x0000000000441000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1376 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 30 PID 1908 wrote to memory of 1376 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 30 PID 1908 wrote to memory of 1376 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 30 PID 1908 wrote to memory of 1376 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2456 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 33 PID 1908 wrote to memory of 2456 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 33 PID 1908 wrote to memory of 2456 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 33 PID 1908 wrote to memory of 2456 1908 dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5c25102cc2418c5f39f3f585b10fed925
SHA1699677f0f13568a548f9005f4979ebb5dc931be4
SHA256c2f993ac92d6221846055842e2cfefed53d3c601c756a5c41f7015b5c9436cde
SHA5129e25d9320c9e36a6771f1fba9972d4df23871d85e7f24edd8f1bebfc7f90920b391acfc7f5dacbf0fb873c79384f675eabb6849bd74cac21219ede5d03987f33
-
Filesize
1KB
MD53ed5df95a87481e7d61d9c9ffd022b01
SHA13534b01c26a15fbf92394221b10f4843f288e259
SHA256b587558a9c1133d172b6edd30170e255ef39ec6c5c33fcf015c40570a2c2866f
SHA51262f7f9206c2ac93203a3d0eed7e247c8e65489027beba6b2ee5529fd80e7b52b434ba2484e43707692ce9bedfe7926c120fbb5c48cef6658abca7ae3c8b00c91
-
Filesize
897B
MD521b2715cd09b8c7368f81001f85d1f7a
SHA1ea60e73c99be2ddee3eeb11d38003708cd47364c
SHA256ab66e822040bba06fead77cbe754914a2dbd2f7c32eb488457719b8967c445eb
SHA5122162684f1d961c73a81d9d0df94562b9a2d72d88f14228bc8eb78cc2de5472966e0dbe3aee552a597adb725b2fc334941c5c78c407eac8b162ae6cb30f97d6b7
-
Filesize
1KB
MD58d92f5f750c22842ef8b9461cfd69d2b
SHA122871a725710dfb17bda9fb0adc9248f9b96747a
SHA2566669521a8abda14b88b3aee97680929b2dfc71fd81d83580181e71fda4923412
SHA5121d07bef325104b925e1bbc818ec05ebef7dbc3868930194cea8c5866937c516e81f389a298a480fcd1fb2795573f4f4212750b1a02ab014ca6bb896e84419881