Analysis
-
max time kernel
2s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe
-
Size
377KB
-
MD5
ec38a92b581c0706e81871d93f5fa4c2
-
SHA1
92a58d195f4d1c22588bb532437faf654c93e18e
-
SHA256
33cbccc8c9a5c4502f1e004e8c13d0a79b83fcf6c37de84b9fbf71167022dfa8
-
SHA512
ba28ee1f9693373e120a4785ca00c737119f9405c590c01e3e0b0eb01e5586230c7d0e7d3837801341bac99a1ab6232fedbed5f21d2df3a4956cbe4490302c28
-
SSDEEP
6144:2bNj4uD+tJgVK5xr+tb9lYpKwC8tBHrOfVMpmuiNmDg3xVPmgXPBmEiMWg2c0IN:QRAJgRflYNC8tkfVMpWz3xsS2QN
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 1 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2120-77-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot -
Executes dropped EXE 5 IoCs
pid Process 2076 Keygen.exe 1980 2 Gansta.exe 2736 3IC.exe 2864 R2R.exe 2120 R2R.exe -
Loads dropped DLL 24 IoCs
pid Process 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 2076 Keygen.exe 2076 Keygen.exe 2076 Keygen.exe 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 1980 2 Gansta.exe 1980 2 Gansta.exe 1980 2 Gansta.exe 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 2736 3IC.exe 2736 3IC.exe 2736 3IC.exe 2864 R2R.exe 2864 R2R.exe 2864 R2R.exe 2864 R2R.exe 2120 R2R.exe 2120 R2R.exe 2120 R2R.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Binary Proxy Execution: Verclsid 1 TTPs 1 IoCs
Adversaries may abuse Verclsid to proxy execution of malicious code.
pid Process 1908 verclsid.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 3IC.exe -
resource yara_rule behavioral1/files/0x000900000001747d-9.dat upx behavioral1/memory/2076-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/files/0x0008000000017491-21.dat upx behavioral1/memory/1804-22-0x0000000000DC0000-0x0000000000DCA000-memory.dmp upx behavioral1/memory/1980-36-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2120-77-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2 Gansta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3IC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2736 3IC.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2076 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2076 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2076 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2076 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2076 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2076 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2076 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 30 PID 1804 wrote to memory of 1980 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 31 PID 1804 wrote to memory of 1980 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 31 PID 1804 wrote to memory of 1980 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 31 PID 1804 wrote to memory of 1980 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 31 PID 1804 wrote to memory of 1980 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 31 PID 1804 wrote to memory of 1980 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 31 PID 1804 wrote to memory of 1980 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 31 PID 1804 wrote to memory of 2736 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 32 PID 1804 wrote to memory of 2736 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 32 PID 1804 wrote to memory of 2736 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 32 PID 1804 wrote to memory of 2736 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 32 PID 1804 wrote to memory of 2736 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 32 PID 1804 wrote to memory of 2736 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 32 PID 1804 wrote to memory of 2736 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 32 PID 1804 wrote to memory of 2864 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2864 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2864 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2864 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2864 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2864 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2864 1804 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 33 PID 2864 wrote to memory of 2120 2864 R2R.exe 34 PID 2864 wrote to memory of 2120 2864 R2R.exe 34 PID 2864 wrote to memory of 2120 2864 R2R.exe 34 PID 2864 wrote to memory of 2120 2864 R2R.exe 34 PID 2864 wrote to memory of 2120 2864 R2R.exe 34 PID 2864 wrote to memory of 2120 2864 R2R.exe 34 PID 2864 wrote to memory of 2120 2864 R2R.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\Keygen.exe"C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\Keygen.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\2 Gansta.exe"C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\2 Gansta.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\3IC.exe"C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\3IC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\R2R.exe"C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\R2R.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\R2R.exeC:\Users\Admin\AppData\Local\Temp\nsy94D2.tmp\R2R.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {7007ACC7-3202-11D1-AAD2-00805FC1270E} /I {000214E6-0000-0000-C000-000000000046} /X 0x4011⤵
- System Binary Proxy Execution: Verclsid
PID:1908
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Verclsid
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5f8988c24eb93773d7ce7b27b0c0ac727
SHA1c88f2424865a87f70b4e3c64aa7f34ed8fb2e9d1
SHA2566ea685865dfc1d676ea4353283de72d61dfb927d548954285b4cf8a0f0cb6f4b
SHA512b5055fc72b7f83f674ffd1ff84e0ee39a040491a9c578cc678ee30666a06b719a1869ba5e4e0330734e0f68063c865274d6b1a2b5cc4d65547d3f99e4b136fcd
-
Filesize
9KB
MD565d2f6f41b1c9d41f9468dbb7fe271e4
SHA157f5519a9cfaa3b3f57b5fed30ca55640c69e9d8
SHA256d0942480dc91cc82e6b95d69cafa0e6d541ca082f22a3cab69b1c0f6686a2fe6
SHA51221000b63ee2ed7fcf85b090c6c48dcb0a7c8e63e70ce47dcdee07cb8b59ce808c1e207dc544bb37888872e731fd36e312d7f06dccdcee7bf1577acc1c3e11b2f
-
Filesize
170KB
MD5db5499ebbfe3df8ef3f407422fab6f68
SHA19fc65b5092099782b80280e6cdaf109a89a16cfe
SHA256f7644bab8ce7f0927f045c6c0ff84cbe45eb471d071c0eada673e9af06e8d7a0
SHA512e132462dd5ac0eb36feb2bd92c004056dc164cd96546455d5202da7621436e06a811d94d8c440e71d429acce7dd8d18bcdf6c92aedc251745bda9342af7aa260
-
Filesize
6KB
MD5bee76c79e2e63e198038e01f0d571038
SHA1fcffdd6bb030f516a46e9d303ebae2ab33af222e
SHA25650a3c7134460bfe5f2840bd8dc957edfaa76da5beaaff70f8da5e0fef80ae876
SHA512dd2e9488ad365c02722e1a2466acffb8beaf4dbb68d7093e01c50cd915418ca0642cb6bdd43f2f2b014455803f3c69dec24ca9dfee11bdf7790379181cd2f6f9