Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe
-
Size
176KB
-
MD5
ec22dfc43dd72912b1a5428daf0bf137
-
SHA1
e7e9c0cfc08807688c6372dec3c37b19be92ee60
-
SHA256
ee1d85f6bcb8090ac766f0782d7be28153a8851899f4d23c81800a97abd68fcf
-
SHA512
ccb660fbaa3391754fc303e82f29181725a77db93bcf7f54a8d3d95d1b14e8c4229a36ef9ad9f2b313b70022759a7bf7e8bbeb172030d37620d2f31c48d31daf
-
SSDEEP
3072:ZHoI8+WdjePaA1q1WMC0XWuUKXK+kW3wVaY+Z4XFc5zItnwog:BoI8BYaA1qv3mB9vJZ0inLg
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2252-6-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2896-13-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2660-76-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2896-77-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2896-168-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2896-2-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2252-5-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2252-6-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2896-13-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2660-75-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2660-76-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2896-77-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2896-168-0x0000000000400000-0x0000000000463000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2252 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2252 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2252 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2252 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2660 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 30 PID 2896 wrote to memory of 2660 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 30 PID 2896 wrote to memory of 2660 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 30 PID 2896 wrote to memory of 2660 2896 ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57d066e7e64d91c3e65600b62ea16859a
SHA1242e53f6f491efc4a157bb6575958ae61608107c
SHA256feacc4c9a0a18e4253ec2e40a0b595bf90da691badd1ad21af2390d598fc53fe
SHA5125c21984ced305030d54058acbe8ecac0ea0917cbd4b3d6d846c103c97109628e1589befc1206814e2263e9a496d5c703f7fa84cd5a6754475e015c9f7193405f
-
Filesize
600B
MD5e3f8a1a41567e7d4ad8fde0b040065c2
SHA1002a0d18e70f6229652ab338f907a7735990a6b2
SHA256321a9c9ff8f6e48b6efb3e0c7b7bd337f2fe04f201f7ba05415a63113bb6bd29
SHA5129f2f3147cf6c1a36d25032da7a83f9231345fbd10fdfe238b45636df2e340fd734be5cc1fb9351a099e8f35e1c3ced16f744b642406334f7b8f3793df8c6ea0e
-
Filesize
996B
MD5c0b8c0e39443929b826539325323906d
SHA13fb90a0de2befcc8c62b26f5cf6ab3d8754e34f0
SHA25654c4707cb3101dd7084c8377d26afa70184c1268104b5675744d40a59f5b03d5
SHA512852beb2643be41978547e96c53797e730dd0d237385bc5a6a219d173fe3555e95ab0a2dbb21e44341c7565ceb11eadf7e0d2c301881ca7591f7126fa0cd31e51