Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe
-
Size
197KB
-
MD5
e309aa7d1c52cac3b0f03e281d342e16
-
SHA1
ae666497af97f1c48a814d9e694273c8872e81d5
-
SHA256
baadc9af4d7dbec9d98bd1de225346bfc879515f67e987d48501c4da59f6d0b0
-
SHA512
15270bd749ff69e1bbaed52cf0c871d05090797a1c29df44440ee267dfcdc8f5bfc1b8f9921146ba42a863634445a3ff462d4dc3c43d88ffd92822c8a053eb75
-
SSDEEP
6144:ZhGOF3Gh261K8G+mmWgGajCAB/rZmID2pNw:ZhGig1G0GajCAB/IDpNw
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2316-7-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2256-14-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2256-72-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2420-74-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2256-162-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2256-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2316-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2316-7-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2256-14-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2256-72-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2420-74-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2256-162-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2316 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2316 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2316 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2316 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2420 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 33 PID 2256 wrote to memory of 2420 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 33 PID 2256 wrote to memory of 2420 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 33 PID 2256 wrote to memory of 2420 2256 e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e309aa7d1c52cac3b0f03e281d342e16_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59592dbc6df4c0e50096de95eaf805a3f
SHA1cd5ac19807a68d03ea372bfc29f17754108e53dc
SHA2566454974e2d4ba07213a225f97e07203febc430f8840b4e640f8c747ea2cfe515
SHA512a62a61aa077f322af7147c241d08f5d67016350a8275a91b82f916791b017b68ee303555f926e5c8249b2aa6a5caeed11a0c6a9ffe3d874f943ced6e4549c86c
-
Filesize
600B
MD517678a582398f8e6a062cbc07ddd3443
SHA1c36fda7e13c4f7c547f82a2d8bec8a831e48825e
SHA256437b48713f1f4b00376f9ea9d7d21c16c9dbfd90fa614cf0974856a47a6b9588
SHA512712c51d32eb9a1e69be4e11d7d0f23fb873b51f8cfbb3f6aa64a5c7b48d0db309bb7a0663e43b27773f17b4cb0d3863348c1e8ff4d05ff185e7f3f527dc79b39
-
Filesize
996B
MD599231a756e1b6cbc08c59c744b425206
SHA1e640b693264b6bdda086d7af3fbcc51474b7e328
SHA256090663cbe83154f231f72a7a7134d9887a7da3c977b738133f3240edefed7b28
SHA5122cb4656dbdb0919aff63da06d7d9464fda0866805d0996d7cd4c26c92898d4e9b9b7c02bfc30d7a6de9bb0b2b7eb3c1cc3a914c2eb7cc8fa3c6fd90e502b6e71