Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe
-
Size
175KB
-
MD5
ec0b8efafb6aa8043ce6e923ab6e64be
-
SHA1
6b8cc0c2430750d1d4b2a2a0d190a95eac46bb8b
-
SHA256
bc4e184421188a6f3899f637bf3074f0fead80f806e069cbcd7e11d0640b5301
-
SHA512
8c6d34f349504dfc840634a14490b9a77088d025efc58acd7177981cffe0695bfaad154708be0d4abeeba1891f2f67ed0d0887b61020426c6a532b8a195ded46
-
SSDEEP
3072:hjM1X4NZ8POD5njLC8qkFcmphvg3Ba7Ecti0d5rsyTvOL+kb041Av8A1:iZ4NZaMLC8qkVvma77t9wH+kbHs8A
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2872-7-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2872-10-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2872-8-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2848-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/3036-87-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2848-88-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2848-164-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2848-1-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2872-7-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2872-10-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2872-8-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2848-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/3036-87-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2848-88-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2848-164-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2872 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2872 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2872 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2872 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 30 PID 2848 wrote to memory of 3036 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 32 PID 2848 wrote to memory of 3036 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 32 PID 2848 wrote to memory of 3036 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 32 PID 2848 wrote to memory of 3036 2848 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD571750e4bed4bc7e42f8764e1000c5e39
SHA10ce9d21569d37ed41f950c6a75492dd6c98535e9
SHA2562f3f92bad7a8bd43d4a88419dfacf3686a53ce7c6f97838aa24814ddd62887ea
SHA5124ee81d9a7eaea640e176626083327cf226d5f21ce3d9f7f522b3a13cbff1b0426b2fa1e5cde8debdfcdeecb2b378ef8bb0882d539e419eafc44a685f1eea2124
-
Filesize
1KB
MD54de3ff172f8fb770a731a85f27188729
SHA14977db91c40f3a144de7840781030c7f3ca59fdc
SHA2560dd7e559c1177c139d2f868e2ad0f8411bfb205e1fd33fb80a1fef062f514fd1
SHA51201cff4daa504b2161db7e51d77a07ba22a0b434f90f32952dd0dd02ac2d74594c23ab65ec299b8dea191c2df9ac7a5ee9019fdb1e0856e37640acd42e670b037
-
Filesize
600B
MD5623198417ae20a7394b005014988b544
SHA15a26700fe7cbc7e6074db3e2d96803aa5df6fa79
SHA256efa559d2b6daa49898b6c9a14cd8845f239ac1dc2800034db26847b4f174b21b
SHA5129d3b778d211fbc70c9e1086f6828fdac8e815375890856a5e7b132b7fa987cfd8709a7e87c9c22a989fb8468e7c135845077a20a3613c2f3ee4b9ceb1bd3cab8
-
Filesize
996B
MD56a426418153baddc81d8276c36fed55c
SHA139e2b59f2024cca9a2a55cdb869597850e86df97
SHA2564d281d4d2fb5f972af0136c8c3affa383b579f1dba4dddfd895f8477a3d67a1d
SHA51292d9b94031afa8f8f99b0305db174c47541750f259dcb95fba0e5ef0164a26d0b952db056941a1f9697cd814b2d7291b0fef439b16da942d087484fd87a3aee4