Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe
-
Size
177KB
-
MD5
e4287f9f12d1f051548d3f8a9553e083
-
SHA1
0d3f480eddbb7cb5606bf30cb20b38a2cc772c71
-
SHA256
51967276621912b1988a5804d341ebc0c2b684adbbbe60455fbac8399005eeb5
-
SHA512
ce1d18c9ba4250d60d5bcae50c0913877cd91c71eddec1151bcfd8f2dbd49a1dc66527338dd46b94c088ae7cbf57cb40db63a5af21638afd5639a8233f34d9e2
-
SSDEEP
3072:zQ7dWmnpG/n8Ayds8XI0U1G4tXPV1k9J4OpWtJ877tbrSzb1MgPRjqVGXQg:zQwmEks8XR2G4v1UJh4m7J3Ib1Ps
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2316-8-0x0000000000400000-0x0000000000483000-memory.dmp family_cycbot behavioral1/memory/2236-15-0x0000000000400000-0x0000000000483000-memory.dmp family_cycbot behavioral1/memory/2236-71-0x0000000000400000-0x0000000000483000-memory.dmp family_cycbot behavioral1/memory/2672-74-0x0000000000400000-0x0000000000483000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2236-2-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/2316-8-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/2316-7-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/2236-15-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/2236-71-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/2672-74-0x0000000000400000-0x0000000000483000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2316 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2316 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2316 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2316 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2672 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 33 PID 2236 wrote to memory of 2672 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 33 PID 2236 wrote to memory of 2672 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 33 PID 2236 wrote to memory of 2672 2236 e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4287f9f12d1f051548d3f8a9553e083_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5e3127ded1dad575c9a5afb8dd182cf96
SHA1264a12b4e83262a5851fd1449c9b030157ffd677
SHA256984cdc16a2d672f59e6d9f9c45cce6ef9f09b4d5ff6daa9a6a8a3086ec4110dd
SHA5123d4b9f6c67295301c55eb3aae276028d11980a1a0cf17874ea1948cec530c4ffba9b6b8bdddaaa61b247a49b5ddbce48cd3e93d0309784fc7a13714fafb978a5
-
Filesize
996B
MD58b9171dbe8d333d88c6226cc33093acd
SHA1109b16e56457b3b6bdfce12a72ee8d78d9e208de
SHA256691910951bf022e405e6642545c97296411bb8e4741c6bf60a9b1f4961948354
SHA512c188ba398a9cf42174c46bde2c63c8b7a87f9e9ea041125dc995005b474a2e58ef95d4f5ae34c3087b6a38878d827f5b0a9f5088f95bbd48ee99faf0cdd7d81c