Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe
-
Size
205KB
-
MD5
eaef5bf35f8a8b4e9a024d385abb861e
-
SHA1
3e74559f50879ecd49b12d966ff67cb3a2af3134
-
SHA256
e2ce517ae5789088bae3135bd8b29eb5be71409f8036ffd3a7151b0e490ff3a8
-
SHA512
1bbac3d5c9df9501d316a4439cf28a8f409d37fdacccf404e1a7e7e61e47dc608d5d11c345566f2fe4ba647645e404c57b64af71a0e5ad6ca02ad0582a60f3db
-
SSDEEP
6144:NtpC09fGg3lfyuWKICrpuxFKitQxEfifHpYz8n:Ntp7hly1M2KitYpfHpC8
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2880-8-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/1884-16-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/1112-84-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/1884-197-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1884-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2880-6-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2880-8-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1884-16-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1112-84-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1884-197-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2880 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 28 PID 1884 wrote to memory of 2880 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 28 PID 1884 wrote to memory of 2880 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 28 PID 1884 wrote to memory of 2880 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 28 PID 1884 wrote to memory of 1112 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 30 PID 1884 wrote to memory of 1112 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 30 PID 1884 wrote to memory of 1112 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 30 PID 1884 wrote to memory of 1112 1884 eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eaef5bf35f8a8b4e9a024d385abb861e_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c09c99886f7462fe8a59b937560d141b
SHA1bcf8b01d30e947c46503748db8bc1060ae1195f0
SHA25689c13d728b5623042b4814f1602d7927145abc3ab4dc342bcc823d4a1d79dd33
SHA5127f30802db39e20f59d2c8491eaa10e8be463c8efee84f327106601b3f94550e0861d4edafc1af6a2dce7d5e2e41f0ce80a645c2294750e0ce4a752b4ed42e443
-
Filesize
600B
MD5d5e17a0c1cd3a4c71580a4e3e136652f
SHA1fdbe62c223d35b3ff40871fb18f73eb0c71245f6
SHA2567b2e4b7eee897b5fa44e42415c5ff06e62232aa37150ce1ca0cd71d8f8ddcd05
SHA5121d394888199e89569af8cbdd26445cbf36b4348c55fdf188ff1ef2e630993a7986587a91ba9e7830b74753fdedd5f0cacad16093ed0a23b1b14ba5d4081fae67
-
Filesize
996B
MD5972990e5320389c3f69cb5fc44599a14
SHA1ed19fce9a3d1aeb1a877b7e21cb9c4f725372623
SHA256c31fa704c530ee21f89133bb499af39f0b6210550c980091418ca7aab2447b09
SHA5120f3446de72f233be409ccf5a8dce65c9c1fde836b94e73e3e4a4ff639d01684e2f379aba7fe28526fb41798c24f03241bc2a249e2c8bb78f4c9e15cfebbd1b4d