Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe
-
Size
174KB
-
MD5
e2db13ffabda7b98f7db88c055f1ed2a
-
SHA1
eaeec9fffa97e1e6ef70f143d7d33d713dab6ff7
-
SHA256
7b0e5642727a1df949d626a625b679b3c1acba1e12e188e4075bf19170a20fed
-
SHA512
dd78c7955737efed511d03d769ca6eb3f242a60c0dd9913b910702c1cfd1382d766e0cbd1da207779553848ab722cf1e9967a90598549093eaf9708a3e865952
-
SSDEEP
3072:cN8KEFR+oANzCsw6063ag9ScrHe5pR1ohJxfe/NHj9c6:cAR+oAkE4gEue5v1og/p9c
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2080-14-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2120-15-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/1480-80-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2120-81-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2120-147-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2120-2-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2080-12-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2080-14-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2120-15-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1480-80-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2120-81-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2120-147-0x0000000000400000-0x000000000048C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2080 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2080 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2080 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2080 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1480 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1480 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1480 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1480 2120 e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5387056ebba57bfa729cd93e79fe06d8b
SHA1f1962ffda5a6490d7d26b0fd61a3f18c53239773
SHA256eeb0a52b232a567dd7bdc1979f682b208cb17cbfa2e22ca08cb84f452eb772c5
SHA512a4d767393b9805fbafde13334e63a55034004ffa995dc37df90f5c53d78a8cbea57789aad555241f2959b4e496ea39f4988a5bbccca26ef7ee4b203527fc7314
-
Filesize
600B
MD5bdde0b173b20b67dbeb6604107e1afbe
SHA184fc8b6e0d5db36de48044ebe2c02a73832e53a9
SHA256ca1c74381d49240fb2bf1b7f5532bf821e9bee5788362126de5fbd0e908f7eec
SHA5129cd3bdde3fbbdad4ead0ac349095f68e307c8161e8fe65544c4a71b98707d075d94ad4882e86c6bca17693d35044333ee6b5a5544b6a52dc9c2008b6f936474b
-
Filesize
996B
MD5977e647016f9d6acbab4021e826ef110
SHA1bb3e7f471bf1b07530c07416eaa0ed9106fdc189
SHA256a13106bde51122e698f75f4d11b12c43620fbd721c3851dd32ffe61b4cf93c47
SHA512de58affd63caf5e05c51c2299df617d0b6332d52d9ebdf90b82e630d485d3bd019d04f1c42205864e185e117e9be3b35e4d2f8d723fb9e0120e235b7c6f794bc