Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe
-
Size
193KB
-
MD5
e90179cfb1120be4f3ade5c2c5578a77
-
SHA1
0b3d7ca0656d915dc3debc5b5b3df45913d7f56a
-
SHA256
9d8e49259ce0ace0dff60387ab055fe3772b19291fa7ba3c98f338c508cf5f2b
-
SHA512
930652d54554e9b5765140ba7af76352759d5fe3be9408a8fab1050e263ebec003f38d8641fc1114da80633e70f060b42381cb17cf7565df52ae024662b72066
-
SSDEEP
6144:V3iMVHKa9HNwa51sxAEfA4mg/q+TDpXF9JI+M:PhEabIAmmg/rpvq+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1212-14-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2548-15-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2548-83-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/844-87-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2548-205-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2548-2-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/1212-14-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2548-15-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2548-83-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/844-85-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/844-87-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2548-205-0x0000000000400000-0x0000000000470000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1212 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1212 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1212 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1212 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 30 PID 2548 wrote to memory of 844 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 33 PID 2548 wrote to memory of 844 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 33 PID 2548 wrote to memory of 844 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 33 PID 2548 wrote to memory of 844 2548 e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e90179cfb1120be4f3ade5c2c5578a77_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD514f8b3e40a99f29b0e74f12081d4f663
SHA125d2f236b2a7358cafd677357b9a8f41140bd267
SHA256a26a7c23e7dbdee71635c3f169b0df115fb5eac1b620150b3871445452c03121
SHA512ba0187023b99022b38119f5545ef4bf351f1d1ab1bbdd14b4d6cc5dbb874bd18a3c75544068f19bd83a45f5100cab770913a1a9ca2d0b5d7625fe0d127f3d897
-
Filesize
1KB
MD5b7320f1925411e2d29a7797582eb8d8d
SHA1e7331ccef4574cbfd3ddc30ec31114a930ec8b19
SHA2565c5fcd4d5b255eb81ca59a963c499157ead65de0d5f2728fd89ef9b0b1ce8a8b
SHA5122307748e9b7ced799aa1b360b599b09dedc65118e16047884fad176e5924a9a66f5b63ad3105ea12990d6696e7b6e3e6648817092b3939841c353bbcd4363173
-
Filesize
996B
MD5934c6b51e475fd740b51b12fdef99d1e
SHA1270cca56dfe9f066ee8a74ca98f28c9374a87e55
SHA256c0577bca4f82cef48f6ee58bd1ad4b16f412da71aa4e8ada3f32504cf1ba180a
SHA51271b82def522fc3392a03cd86d3e6ea0fac18fd6d758530ab7333a372fd08474439a351cca93eee33a88405261a48c2659d1a0a6c42cef0807f0e3974d62bfe8b