Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe
-
Size
176KB
-
MD5
e40061adb0a7d4632d60dd05a141a9dd
-
SHA1
b2be93887080ae26bf970ed8445fc8220721fb13
-
SHA256
8b46106985b66c08217ca954ce45e0782cc9656fc7ed2b1fe189b2fc8bd21281
-
SHA512
cc2d2acfc8ae52991d17021a71a9b4cba5390c7f668ba43b9be1b0b34c5ae56c3ba07dc05ace84fd81208aa05e1874b18d926bbb802bbabfd2cde7b8ab5942b6
-
SSDEEP
3072:GJ4ujspDuTsIDV/gWtgapfGOLxJUgi9WSV4x7KEigdG:GJtwSsIJ/g9apeOLjb6VV4M
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2836-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/1508-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/1508-89-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2180-93-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/1508-209-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1508-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2836-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2836-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2836-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1508-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1508-89-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2180-92-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2180-93-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1508-209-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2836 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2836 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2836 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2836 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2180 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 32 PID 1508 wrote to memory of 2180 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 32 PID 1508 wrote to memory of 2180 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 32 PID 1508 wrote to memory of 2180 1508 e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dcfd67008b43377b0ec3dc240ce6b55b
SHA14340ab799c9acb6f0e21a5d0c1d27e2b9d63b75b
SHA256ab8ce8afca179a1bc20ed73833f3b818ee660557f2a14ffb20a285cafec4545f
SHA5127154cdeb423fc12118ed3093e55a8e3f8ac62dbb2d6be71dcd7ce98409f0a2cf680cc3386dae43d5a2e6ba01cc70adcb9a42f186d0346742aa54a5567fc09ed0
-
Filesize
600B
MD51844d2660fc6bbcff9515fd6cd60e2c4
SHA1509ab67758995e56e4dbc0e96b816607432372fa
SHA2567bd9cfdb6263ba9dd8caae4a7c029c0dbbcecb8c05bd2e768ae6bc0199b2540a
SHA512e696366be4eea3be06eca0db8016ddbd369df3018484ecf475c40ebb988bd5219022b33cf39df2bb5ceb8a09248e11cd12768ba90913a8e6b41d7ac3b97066e6
-
Filesize
996B
MD516dc69611d5a7fe22e1837fd3e300ed3
SHA10530aed6b5f3296cc44a3da62f1441528b6e1fb0
SHA25606538e0769c71ef72dc69f7945412d5e3dd83edd57d4df2f0349fc656a0b68fe
SHA5126776fcf2d3ff24f2a459778504665e0b6cd234a4222a264e6daab6c0c9276191fce200b6fc0c789ccc0ac4ddd515dc67bad7ecbcb477939ddeca56d1de7f02bc