Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe
-
Size
189KB
-
MD5
e4129dd49a25fed941390c3c868a00b6
-
SHA1
fef286ad794c1030b0d13c35352f955a9675e3e7
-
SHA256
b97ce8b785b7796c78e436357781c54c139750744a2e48221c5e11291df644dd
-
SHA512
68c692c3a2fea5130c43f4fbdaf36f18f67719b44f2ac558c8ed32fec80e010ce3dac3848c62054907671d356707e155d33d2e2fd5a7497d1e0c65e224f873d3
-
SSDEEP
3072:XhYBm4OJInA3dDresjpTliQEZoSbzj4za1uJTNUGe18XtkOxgxxNWTrCIIgm:XhOm4AInA3dXeSVUQEZ/bzolzVVO8q
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2556-8-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/3032-15-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2912-85-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/3032-86-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/3032-176-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/3032-213-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3032-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2556-6-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2556-8-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3032-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2912-85-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3032-86-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3032-176-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3032-213-0x0000000000400000-0x000000000046B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2556 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2556 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2556 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2556 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2912 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 33 PID 3032 wrote to memory of 2912 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 33 PID 3032 wrote to memory of 2912 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 33 PID 3032 wrote to memory of 2912 3032 e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558398bd912e05233ea49f0687e79435e
SHA195251bde8261cf16f3093aee843ae00b0c50b2c8
SHA256f87d57b5cfda177b8dd8ccb30b786284f55c08158c39fc5667f150e12ee2a1fe
SHA512b3a05c03b89071f7d1d84460a13182d1b19d3bc7096e7ce0ffaf6f5fb2509a2562035551795d7fb1b0beec44e8f2304b8d0cfce002cd2b40d26353d56c4f50d0
-
Filesize
600B
MD583b8a4d73b65f44aefb9109d52ad339b
SHA1e83c8fd448eb8c24d4f4d532aa3e09560ebe2c1e
SHA2565794e91bfca8d4c422e31d11616337d94b5a2451a12e39a58884f4f17c1f39a2
SHA512e93f9f742bf6b512c395481c1590ad8b763ef9f6954db13e45a0ddb835a041090e63fdd30a47282562b87d92ea1f56fb90000735cf76c12b7a1e60258f3b0920
-
Filesize
996B
MD577dab33af51d2e19a3dcef017fb86b19
SHA1176df9feabfc145657e4e36d3b3cf881c7df86c7
SHA256d0613a2ae691186ff74fd595e6136e55aea5008092abbf4bf490b4188c6d47fe
SHA5127c21ae70111c7e0facbe6b59960dc2fe1d3e33101ebbd035424a624aaf11c20ef93e68d08a6ec68506685c7c35d31d5ad851ea57eaa2868dfea31b05e9d8660f