Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe
-
Size
189KB
-
MD5
eb1ccf55e4d2eca9b18950de56f73d5b
-
SHA1
24e922a33d7633cb5ca663e369c6a91c07fb1666
-
SHA256
b3b28e866c281dfcc5c59976b95544659444b019a40e2693f4eec210c983884f
-
SHA512
15b84f9421a645db2f282f81c7c23b2a2480301a0dc5df04da7cc2204a8048945ce5e1fa9932a75306ba416e885f3dc299e09cce1334eaefb2ce8c4146d1f190
-
SSDEEP
3072:J00TiApT0yjqipyte+aJvlcSpQt1V1bjhiCnSWFuVLKV623FC72Ku1ciGE8c:J00XBNyETJtdiF1bjhimSNLKV621C72k
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2744-9-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2660-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1752-80-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2660-193-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2660-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2744-9-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2660-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1752-78-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1752-80-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2660-193-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2744 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2744 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2744 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2744 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 30 PID 2660 wrote to memory of 1752 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 32 PID 2660 wrote to memory of 1752 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 32 PID 2660 wrote to memory of 1752 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 32 PID 2660 wrote to memory of 1752 2660 eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eb1ccf55e4d2eca9b18950de56f73d5b_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59514cce2740d3f4a9a975ea3ccfbb061
SHA1d53461932650eb0e557a482179d962ce8b576d57
SHA2563b6a2b3e9914ca34238110d2ca15578af8e2b6aee9d9a5f543a1c9b96253c875
SHA51251467f99b7dfda76d3b5e1d3997cfcf758b50f3fd85fe0d28f4e82821f4c462596511cee5631541915a13a6870bafbf1485c6340a44b83cde59d6e0ffe1c1cdc
-
Filesize
600B
MD5587675354683d5187fe2d466144fd9bc
SHA1d6867c7c34823154d0f1004a829b011b95e2240e
SHA256e49d416c0b05a0607789e7c94879f34cd768af8766e42e22a8753225a4ae7e51
SHA51244354b4309c9507731d9de54209fbe2259c0590845af23495f5b8f7f3e38999938b2efc8c5472119f2acf32dd761d4e00a5c6cba4dfb8cd17a04ee87b09811c4
-
Filesize
996B
MD545fc490c1e69396cd5eb927579ccd772
SHA13fd460cface2f84e0079a6b357555b03f2cecf92
SHA256a0f4f00c6cd9dc5830b6f4cc2169e551d0a3f260897ebecda833e33e68da9218
SHA5121fd68fecb0b6cef65ba741a599c449a641086704e6ca6170d0a18136deab7cdfc3f5be987bc1431b4e4140962d9d54105bbad190e91d0c2f6b1860a4325e07e3