Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe
-
Size
175KB
-
MD5
ec0b8efafb6aa8043ce6e923ab6e64be
-
SHA1
6b8cc0c2430750d1d4b2a2a0d190a95eac46bb8b
-
SHA256
bc4e184421188a6f3899f637bf3074f0fead80f806e069cbcd7e11d0640b5301
-
SHA512
8c6d34f349504dfc840634a14490b9a77088d025efc58acd7177981cffe0695bfaad154708be0d4abeeba1891f2f67ed0d0887b61020426c6a532b8a195ded46
-
SSDEEP
3072:hjM1X4NZ8POD5njLC8qkFcmphvg3Ba7Ecti0d5rsyTvOL+kb041Av8A1:iZ4NZaMLC8qkVvma77t9wH+kbHs8A
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3320-9-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/1460-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/1460-73-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/232-78-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/1460-179-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1460-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3320-9-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1460-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1460-73-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/232-76-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/232-78-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1460-179-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3320 1460 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 83 PID 1460 wrote to memory of 3320 1460 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 83 PID 1460 wrote to memory of 3320 1460 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 83 PID 1460 wrote to memory of 232 1460 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 84 PID 1460 wrote to memory of 232 1460 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 84 PID 1460 wrote to memory of 232 1460 ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52ac05de167b5f166a8515cfb8141ab01
SHA1ceb85be3c0e7e6d79db649ca0adb4d86167fde38
SHA2567d7c782005efdba473ac8850560fb9467c047dd7ea9fc4d44f7ee680b85e022e
SHA5129f63047b3a7365d2d5b90444da7040a0a1596060e293ac70c197cef63c4a7abd7a5c48452f905bbf892093fb42372890d8017f90019c7fc90d5917cfaf369194
-
Filesize
600B
MD59546c042225dc6fcc6ce04c8efa9c074
SHA11dab3670dab0b9025cb3e37f2510051c76febdf8
SHA256f43d9c6a92c1f791b5cc6f60f27fd77ea367af8b426debdfd6f53016ce363d36
SHA512f8d4a4b10b26c50828b01ff153500d4372da99de0a7084f4efae005fee4493f374cf01c4a5f6b7de7d206580ebd56837003b01ca8aed61c5625f9272951089b4
-
Filesize
996B
MD53537f0d1acdd70d42b861a895d3d26f2
SHA12c318fb82bb3f70c66c7510a3d049a5b6508bc42
SHA256bf9a68f0e96de7e31dd6e78a58fecd9123014b9a306acd130fc320604139d32c
SHA512687ef74c4c072c32d28c8fedfbaa07995b3351a0eb072255b1f60f77894c611be369fbb4065384933d8ed57627f624f1192cf2412bae21f309366c3c81a578a9