Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe
-
Size
199KB
-
MD5
edf6ca9d5b98c91415ccf111b558edca
-
SHA1
68626b8b39bee844a3e3650338aac30e8c297f61
-
SHA256
be1f65d9537dcb5f4f81724834d80692575b7817e34ed0a0a84686d4e2e53dd7
-
SHA512
c9ef41c68a0a8155ddc7ac00b341c795df61da36db8e9ef09cc54164ba4c16fff1bdb5af4a577f7fa7f48f1f92a805ce56ee243365d0faa48d5e853b3d5c602b
-
SSDEEP
6144:xqHhNbbqGSrQf2Q7846hSnwt1JRThXjE:cHPbb32QJw5bXo
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2316-7-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2256-14-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2256-72-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/3060-76-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2256-160-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2256-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2316-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2316-7-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2256-14-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2256-72-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/3060-74-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/3060-76-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2256-160-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2316 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2316 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2316 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2316 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 31 PID 2256 wrote to memory of 3060 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 33 PID 2256 wrote to memory of 3060 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 33 PID 2256 wrote to memory of 3060 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 33 PID 2256 wrote to memory of 3060 2256 edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edf6ca9d5b98c91415ccf111b558edca_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD574c914c4260aa830e75554c62328c77d
SHA18531af23d31ad0a177aef81ced12dfc8f44306d9
SHA256bb6251b9baa7b1a3a0295586b25ef1d3fdb56d4e4b0d1ab3471a3c8339486778
SHA512f5870e92662c3a296f6df35e879ad957ae1f68d8eb2155885f74972b7de316bf4ea1f777eb005691d48e9a3f6b378d02cde26eec18df4cb977f9f9b85fb055a9
-
Filesize
600B
MD5ab40e46e4864761e118dee3120862dde
SHA137e5b94cd435fe30368fc3451bae9aa39bddd4e1
SHA256131b2446219f9a58baf6c3990aa4f03e1c8811245023fe8e52ee927d4cf3a6d1
SHA512306a4d42efaf9427e9d1d336f5771bdfa39cf6f2043a5f10a2bd07f07425523dc6825ee1dda68fd87267fed0c13dc4c6042bd06a61843dbf5054ce00eb7d2434
-
Filesize
996B
MD55a2645f733c6cea92c15fba1f997a1a0
SHA1e4ae0a2e7d180a4d71abc89ff951aeb271a96c17
SHA2567d3fbc0a06a9641ba0d9b1427ac62c454bba0765e9e59820fd62ef08af6ae513
SHA5126b7fdf1021b37c57dfb5e626b434badac9106dd8eb3e0e39860e58a1a877aa47ae73829e5c73fca60d8d8ee2912c0b40af7a9e2849d7982348d88cd8b294f4e0