Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe
-
Size
172KB
-
MD5
e1781288d509e970ab6bf78ca88259a3
-
SHA1
e5b101dcef4a9fadc608346e158cf04ea34adbd0
-
SHA256
1823d59953d6b8da5ef82c382b6b8ad9db4c62b92687aea5df1c6d3329dd396c
-
SHA512
b97533402ec10d32c2a38e6003ab4c9fee108ec51949538f36bff12b0ec0332605f550d57c761f5e2bbb145a8cb4283559ec7ecb21fe95fbcb795bea7d52fd5d
-
SSDEEP
3072:T0JA22FMtpvdgJEolzusinYpmc47eGFJGrg4LWZRnf8ZzShVOAkkx:T0B3tEGmzus43rTGs64S4p9x
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2236-9-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/3060-20-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/868-100-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/3060-212-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3060-1-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2236-7-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2236-9-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3060-20-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/868-98-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/868-100-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3060-212-0x0000000000400000-0x0000000000469000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2236 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2236 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2236 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2236 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 30 PID 3060 wrote to memory of 868 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 33 PID 3060 wrote to memory of 868 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 33 PID 3060 wrote to memory of 868 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 33 PID 3060 wrote to memory of 868 3060 e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e1781288d509e970ab6bf78ca88259a3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD59a5655204e481eee1cb860a5eb256d58
SHA1bcaf7680cbf29c541cbd07457fe2cdc642b3acf2
SHA2563c4071393dbf069047bf01ad5e99ea12ae92e1c2fc70ad3822ce82d125aeec62
SHA5126bb3d30a654c1711786bea4b361e6dd5edb7e2f10c019a078e5f79e50940d71a0ef1a0a35fd5c6125fdbbdd81e7341fb3c4241cca0bfa4bdc63fb027d7966980
-
Filesize
1KB
MD5857e03ffde0d449a5b56ec94489bdc1f
SHA1914d74a32deed28b89e701632d7523ce1dd1f3ff
SHA2560737bb9f0ce9acff7b1b611df7e3f4fef41ee18c4d60d0afc7a2c2ce1f2b32fb
SHA512b709b4c816062ec5f160b96d312fa0aceb1700712562c2e44413bc970f398b078a64270288c30791507e0a6a526e6a3e4eedff754433395de3efd5f1f4a1ebdd
-
Filesize
897B
MD5a15c8264b342ff12ee737d473774477d
SHA1245dfb3212391ae838e6819dd44ee49522e09eae
SHA256819cde57e681144293576d1e236ed82b1f10bc62e3b3678e570cf5348b513cc3
SHA512c65a7d76c3c02f98461b9140e53a285a5ec8b42507799e505f284ed84354e742fe47564f682770e49d25c448162dc2d3a12b976671eface70139c1724f7832ef
-
Filesize
1KB
MD59cbd3e1aa51e88f585eeeda4770ef25f
SHA1812a50aea7917206c0b22a9458a16e51b6050aa4
SHA25650c3a27985e2bc9a9b311bbb000a11e860b578e3bde99992b6d4d2ae3f3fb702
SHA512456b812d1d1c3999640d55edab2214832a4f57bbddbb5eda4dd1df8086f11449b90146f1997d853220b555132d1d956c586c3301800b0aa18251c2b3a74261a1