Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe
-
Size
167KB
-
MD5
f1427f067f387dbfbc1e5f12b39a017f
-
SHA1
47f08cd4604b99ebb73344358a38989ea1984ec9
-
SHA256
2f19a6bdb0d94422a7b0d3ef587cec244fb537c147eb28ea5c891cd763af0c80
-
SHA512
0155f6c14fbbc6344ad3381d262284ba959f196062d7f94e1f10e9a89eff67b48c00402061659506fb0db2c246c2121750b95d5e4a386effd1cf6a4fefd48690
-
SSDEEP
3072:cdEg6SIBWURMoMEPF4BUAB0fl/J7Xe1nZwZxGZYUJLtZSpO:uEgCMoMoqUG0fZ1OJZEGDVtZSpO
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2696-8-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2696-6-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2692-16-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2692-75-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2060-79-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2060-78-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2692-188-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2692-2-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2696-5-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2696-8-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2696-6-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2692-16-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2692-75-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2060-79-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2060-78-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2692-188-0x0000000000400000-0x000000000048A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2696 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2696 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2696 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2696 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2060 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2060 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2060 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2060 2692 f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f1427f067f387dbfbc1e5f12b39a017f_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59a62b335a8dd921a67537c3e2af1de03
SHA197896e7c17e183efdf9ac068ff56d599e470133f
SHA2563f55bfa3eb76838e3ce029cc32a2fddbba09bfa73ee5062a933fdc0fda398d83
SHA512d0be700283051283fc4a21e5bf0867311dc3d1f333e6bdf0afe1039f07826de9da735861352809a09d5690a41458a3ad186857ffd912f893c1bf08a537c2ee26
-
Filesize
1KB
MD5291552181ea210ab1687d0ca3c8e0fd2
SHA196c92102b563eeabfab709ab40c0c73a7aa21a7b
SHA25691d3f9872cef4d6ebeaf445d83e85f58da40dba5256bef32dec81174b31cde8c
SHA512ca3f42252df4764cc48a39f08c5f84384f6c1ef2d990657e176212103375ca2211c352da165ea75af5d15fe8b5c773e44bb598dbadb8de77025400d51343e56a
-
Filesize
600B
MD57df899c6532b09f191229584f7ac39a4
SHA1c2b3a3878acc6ab574e4fd5f27d451d6012b8c8a
SHA25637d2a1a7b547b68df95638b6cc2072c1b86d68b941bda37c6466df62abaf851b
SHA512e969b9f0b287a54de33a913d62b4e08eb2a04e0a5d38aea90978137c0e68adf15478389c46ef4d51797be291b15c7624bd9f214ea27f5aedcb226d9816fa3c82
-
Filesize
996B
MD5b013e01f1703c7e38bd0ae70438b9e40
SHA14a6c7b5948a174b38b1437336e045048c2e3e87b
SHA2569b8f77ef10df2ee16ff3c7f986f3f0d35bd446de9546ae08dd9e2805f97fe568
SHA512c157080f8488ee2d857d5d2bbc224ddbff06e0121d75c01fbee062c8ef18c35ba8d1999a9c080cc69ca4fa497d92557e608cf790c567e0991f0b0bc2efe68114