Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe
-
Size
174KB
-
MD5
e1cfabd400713b2926a8217f5c63e830
-
SHA1
f6e820e18302bd03d019d666ccbebfc047e854de
-
SHA256
b685112151dac91b905e135bc7013f4f3a0b864bc0ea1f21e40007f749474384
-
SHA512
cdacf68e5e1c681ddc367c6afec58725ebec5a6158536d16a669192e2aacb17424b1ec0ac2cc26c53416d58a628547fd206cd171e246f2edcfc6351c9908fb00
-
SSDEEP
3072:V+XGV3JIxczDgznrwD5UTVCmif0J6L3/bhwoyjsdwU1dwG2zFv8BPlaXd:V+WVZIxczDGEDSTpJ6L3+0SxSPl2
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2052-9-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2012-15-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2012-82-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/1740-86-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2012-207-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2012-1-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2052-9-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2012-15-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2012-82-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/1740-85-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/1740-86-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2012-207-0x0000000000400000-0x0000000000444000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2052 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 31 PID 2012 wrote to memory of 2052 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 31 PID 2012 wrote to memory of 2052 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 31 PID 2012 wrote to memory of 2052 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 31 PID 2012 wrote to memory of 1740 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 33 PID 2012 wrote to memory of 1740 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 33 PID 2012 wrote to memory of 1740 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 33 PID 2012 wrote to memory of 1740 2012 e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e1cfabd400713b2926a8217f5c63e830_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568eeb231a405b046ae73fdee6682d498
SHA1d057dbe515203a72c57ebadc15865289ff5554d6
SHA256d66d01d9c9973b28219902c13243da9964964c8efdde105ebb63963a87bcc065
SHA512b36c5de856f27fedf39e0f269d40d61d0aca26adc62fd2dc73f51e10ede8e76c32c4cd4923a03cb821419247d2cfc03a10604c9331a9a6b3828d6b1d05b53259
-
Filesize
600B
MD58261d54184f73a0e08bbee75bcbbbf25
SHA1f3c8feb8c7f02a53f2f65a80319e3a2cd6f550d8
SHA256dfc75ceaa348a30ab8c06811e9495e54e0599f691ba0363d1f6eccd6616b2f86
SHA512ffc61357d4212662336dc591f8607dd59a6d470741fc9e4fa1ad23203221309aac5ad4d1d88f830dcb98239cb8437c7f3ccf0a046d6599f8a8af6e3814a3e23d
-
Filesize
996B
MD58439ebdc023c926f0437eb6966a13a72
SHA1bccf4d9eda1316269ca3e0570228c692fa56cbaa
SHA256ebd5a0e1e5cde779822f2a2e4f26da17709f2c7f08f61715b2a83e8c83a9059c
SHA5121789fd6bf1e37d87c4b705fe9fc5c638d2516981ada5099a4e56b0cacd3332583299dc7dfb2cf5d6769f73f3102f31dec53107ba1628df0d509c50115ebd050e