Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe
-
Size
171KB
-
MD5
dd861d2584a7f9ace519217dac5b6491
-
SHA1
1989054faeb8eb020b28caf2f806e43ca2562243
-
SHA256
3c6e64530090d7512859acd5dbee517cecbe74875c8d485cb73e514fb172123c
-
SHA512
94595527ee1b6f383e5f54e1d0b58102b0c3776dfbb05aa138c6b397853cc6ac5b17ce6c84987b9ed979f5e901dd228d2a21da6c5fcd1400854b0dc07ffd1530
-
SSDEEP
3072:uMXe2Klg0YHb6SiH7PUYpMaTzCPdcGq9zT6DsORMQ7c2Anx:ygt6SuPUn8C1vq9n6Jl7c2G
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2516-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/388-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/388-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/496-140-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/496-139-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/388-141-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/388-291-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\D8806\\723C3.exe" dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/388-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2516-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2516-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/388-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/388-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/496-140-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/496-139-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/388-141-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/388-291-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 388 wrote to memory of 2516 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 31 PID 388 wrote to memory of 2516 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 31 PID 388 wrote to memory of 2516 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 31 PID 388 wrote to memory of 2516 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 31 PID 388 wrote to memory of 496 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 33 PID 388 wrote to memory of 496 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 33 PID 388 wrote to memory of 496 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 33 PID 388 wrote to memory of 496 388 dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe startC:\Program Files (x86)\LP\C32D\B03.exe%C:\Program Files (x86)\LP\C32D2⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dd861d2584a7f9ace519217dac5b6491_JaffaCakes118.exe startC:\Program Files (x86)\06A56\lvvm.exe%C:\Program Files (x86)\06A562⤵
- System Location Discovery: System Language Discovery
PID:496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD562fde4af321e442e7725bad161a621bd
SHA180bb494050ed833ba15bb56bcd6607876f23f95e
SHA256f6b853687fd18a48ba22a1b9b762b797720fab38d697436931f6c97e5d3c1541
SHA512dd6210b95a12016dbe7757b899a69c921156dd6832b78fb4b4eb5a38d8ba7401c56c39cda674a353578941dba92ade74ec3a6be2a7e29efad94db1ff4ea15e40
-
Filesize
1KB
MD50d861c5b55e61baff177b9a4fe3dc762
SHA15ef11eef7535a2de50d50864af8a9b3b6de503be
SHA2562529144e6b5f0fa6bf1c5dfec58474bcda8507ded6b6942e52a87c3a4e881c7a
SHA512c5e9e8ad6e04023b60052df6611d368d4491c17f6e4e3324dbaf42a1641bfa9e884933f77aff551dbb7cb02a46b37727ef3731a329812b608323a7d73ed11f52
-
Filesize
600B
MD5328c09ffe9417fb0c7660a01aae60b5b
SHA1b7dd699310d3df6f746cdd0f4986c2a48dcc9760
SHA2568ff4dee28dac108889c6d6d8dd72f76f6d7caba13557f1b03c72c593f0f00c2a
SHA5124817169297235ecd94e779f62dde362b164d4afabe1e7a51f1a138856968e29ef8ae1d6b2b8e8406327076bf156c40178bc8dde27326a47e788588863846c3bc