Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe
-
Size
181KB
-
MD5
e8b3747e27c2a5301ab052b00cb7481d
-
SHA1
a2eb7df8211fba3780f9b1373309ad61ee47de3f
-
SHA256
e8cda5bb3bf4a7c8d6c2cd7d15a4e73e8efe68b8df2bc0146a7540c59e489375
-
SHA512
d0f1118d81497a93a014d4b6f1904e605fdca0ca5615a66a830eb194a4228c75cc985d864fe395b168c15016f3fe16262d7605a5a61072a5774b82c242c4f32f
-
SSDEEP
3072:1lpe9xEv8NNV2yYaIXvGhXkykB9SgluCRXSAVWn+fTtYKh0RCA9qUGRQtnk:1zcxEu+yYaIXhyknSgluCRCBn+fTnCR4
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/684-6-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2068-14-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/272-85-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2068-86-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2068-203-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2068-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/684-5-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/684-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2068-14-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/272-85-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2068-86-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2068-203-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2068 wrote to memory of 684 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 684 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 684 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 684 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 272 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 33 PID 2068 wrote to memory of 272 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 33 PID 2068 wrote to memory of 272 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 33 PID 2068 wrote to memory of 272 2068 e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55c5c4350d908911fb6c6928c2c4c1215
SHA1ce639c59fc5991672a1309beee3ae29dc909f440
SHA256a05aedd303616ef7aa86877927eae9501f7bc406b6ad59e3df8dfbc50959349e
SHA512d0cce207b29ba2fcdba0e4668c8b039afab31e7050784badfe32e46bed42c6fc4c0a67ed43ed5d9719907f97f72afa4d13f102d76fa2445fa62bd321b70091cb
-
Filesize
600B
MD5ed13a0b691e0303eadd1235b2d271038
SHA1564821e49c05e404568b78044bb656cee65cd095
SHA256a8ecefaa2fbee1e6ef570419b594bf8df43b67c86ea7e7a3c568495d267c4deb
SHA5121cfe2d58d931975a38eabe51876630c21d68f123426915183b3a7f15f4be89092bb5a308e311b71f3e855774e95e9db0c8d570811fee58ca4fd4dc73fb33c375
-
Filesize
996B
MD59a5f1e9de32238daaa9d5d1ced85e898
SHA1a8bcd7f72cecaec1b48d5b224cfbc5fc7d5a04d3
SHA25656db93260ce4a79e71adb30fe058e5049d72f1db43d3713869e8096bc128834c
SHA5125af5dd90f3db71ed261adbfce7ac9dd2cd5fc1302324d693707626824da248b8e0f1fe276a8c594042c192a422620fbc64bef709f65b299797d3733d9668e469