Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe
-
Size
207KB
-
MD5
e108985fc38ba9f5c33ea5b4f7c4c25d
-
SHA1
943d70c4f58726b96380567d62010a2e10cc76b4
-
SHA256
66b1b0c9f47b042d080c94ff0499e7865c6708620b095d4eac398273160fb440
-
SHA512
5bb36cfd3328502a525a0cc1e7852250a4e994233282d1a690f20899cbb5487e33ef7d7014d3dd1604cfdc251b261876f54e2f7074ff817ff942458bdb90c1fd
-
SSDEEP
6144:yCd6BBQkUZ3hufnsUx/3GeGVGUX2Y6XTY:y/kwfceG7
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/3028-12-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/3028-13-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/2692-14-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/2928-85-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/2692-196-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2692-2-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/3028-12-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/3028-13-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2692-14-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2928-84-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2928-85-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2692-196-0x0000000000400000-0x000000000044C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3028 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 31 PID 2692 wrote to memory of 3028 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 31 PID 2692 wrote to memory of 3028 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 31 PID 2692 wrote to memory of 3028 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2928 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2928 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2928 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2928 2692 e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e108985fc38ba9f5c33ea5b4f7c4c25d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD56e18bacca31a3dc92cc4c9686a425f6c
SHA13ea31ee99a3155ca2d30869274587a8b99af22cb
SHA25604e60caaa6d160792b9ff08d169e337fea2f1c1e10de33b32a13bfd554d641c6
SHA51280aa9797c27151c1fb7a499aea54668eb36f12ccfc5851319f0cc161aac3ef55db12688c1c4d07ba2585630268d69c0594f194e7e8391cead61df5b3b399ca82
-
Filesize
1KB
MD5c69394afb7701b7fbdf6f9458a8cf7ff
SHA17c8811b2c1e79571227dfc9d16d3698a197158e9
SHA256bc9c2c6afc612e28db006ecac2a0dde20726a9527f4d30a272ab83ed59002061
SHA51226ec30a3f31ca0da20b7bb7003406cbf452928f2de2bfb8487d457c0f78245b2e6929e0e362f459dec26632747cf7225143b104d5088a5a1edf53471ba6d3201
-
Filesize
996B
MD54a44ecb10f29914c453c8d77917a3b62
SHA1ae970b33d43b62af4be59608210abd08363cca6d
SHA2564c274354fcae18bb4ed68cc58497ff38cc9eeb3898e67cc4ae8547ee79dba526
SHA5124478e747191ec476b954dbdcb5780c76b42a1f870978616c75a145dc3be5594883526f765eeda0763384ac340afcdedba2ffc01f6f1e049e2a726eed5021751f