Analysis
-
max time kernel
141s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe
-
Size
165KB
-
MD5
e892ab03ade3ed2e60ac6a42ebff863d
-
SHA1
9222c2a015a96c35e58a781b27e5a01c9ec9c4c8
-
SHA256
99a87e97639663f4fbc9d92aa505a16410b3eff11c594658c6716907a283f21a
-
SHA512
43ef37865529b039134583744f032b92f2e17652c900032fe35fb460edffa00c69273c2518173509830fe5f9bc60c1048d2fa9660839986fb237b201c79d7eb6
-
SSDEEP
3072:mdIhB/iDjld0dsvDnuxluIIkWj/eoOtqysPiIFov2eKACXqoRr0CQ/33DTB/S:mdi6fld0dGUTPWKqycNq2esXqSr0rF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2840-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2840-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2124-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2124-18-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/3060-116-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2124-117-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2124-283-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\89343\\FBEB6.exe" e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2124-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2840-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2840-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2840-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2124-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2124-18-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/3060-116-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2124-117-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2124-283-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2840 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 29 PID 2124 wrote to memory of 2840 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 29 PID 2124 wrote to memory of 2840 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 29 PID 2124 wrote to memory of 2840 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 29 PID 2124 wrote to memory of 3060 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 31 PID 2124 wrote to memory of 3060 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 31 PID 2124 wrote to memory of 3060 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 31 PID 2124 wrote to memory of 3060 2124 e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe startC:\Program Files (x86)\LP\B668\826.exe%C:\Program Files (x86)\LP\B6682⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118.exe startC:\Program Files (x86)\4399C\lvvm.exe%C:\Program Files (x86)\4399C2⤵
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD513f6333850a529b9a49da7b71aa0e93b
SHA1e687ff4ce09ded5cad32412a052b3394a6c6f0ed
SHA256db089a8aa6945ce058960c4b53d4bfa03591a93f2dda7e617888ef9540809da0
SHA512c730c90998e4fa34a54525123c3e53555b8c3857c3e17c73f4a501433e10707f822d77dd5aa7be935c3873c745ad87a93a92c89e0379aadf0118c9d74c713607
-
Filesize
600B
MD5e1efbd907880cfdbd223b1c53a65a64d
SHA16fb55ef1e2f53e757f8ba171a29256d7f031e2e6
SHA2560c7dc809f650f743f69454cd4d4ac329989aedc4e941dcbbed6344271a7d007e
SHA5124475e50d2fc2b0d8907e3298643b061ddc057e50314c1fb30073bb150cda97f1c7fec76780050b9a76519ebb61cceefc35a0a1782cc3fbbc1b02d7d2a1283984
-
Filesize
1KB
MD547fd89daf5ba69bdace8168bc7f1bbaf
SHA1af189742c531c37c1b94dd0dfc9601fe6bcab637
SHA2563be4225103fd15703d8fe2e273b7624bd34f504b93a2243a3e16adda2330c026
SHA51264b52f1e838163a2685b8075d0b56faf188d17593f33f53569d7bfdc62d8dd2bafe0037e1209cb6dc478893fa4ae41ae444376e0d8434d900bfccedebf363421