Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe
-
Size
195KB
-
MD5
ee6e122788bd4d50aa241068682d4462
-
SHA1
e1d04dc2a97d146d9e66450d5e3707767731a334
-
SHA256
c96bf2ab5f93ede2367b5921dcb543dfa4a32c71e5d61761cadb6e847e909f33
-
SHA512
c426d0150ae9c8a0b4d8cc9f8bf625d1a0b51671a3f19a41124d6efc5ce66245c66fdc30f387769ce7c201a2222eabf02b17efb59ee22d54417b4e50276f5ea2
-
SSDEEP
3072:WuLlwyWCwDBWvnU3iVLtFnD2/S7mx88pqazZPVlYYi/lmcvsokL5jcWeWNGYtpnP:tCCwUvn+DpqEZtyYiNmcVIOWNq2d9jP
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2508-6-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2168-15-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2168-80-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2252-83-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2168-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2508-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2508-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2508-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2168-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2168-80-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2252-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2252-83-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2508 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2508 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2508 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2508 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2252 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2252 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2252 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2252 2168 ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c52479eaec64d1a6b4f3d97ea7e870dc
SHA19946de7adb0673d369a996bb8693fd73b68a8008
SHA2569de2dcd9bdfc6cfd25a72b4b344219a9e43343619e02927abd95f2e346f97de3
SHA512e34d12502a621342f08ea0fff45bc02db1017e0a99b61b8e00ddc09c951a88252fc183f887d791195673e4b2f897afb5f3ff7a2c60e609b248f2d410324782ec
-
Filesize
600B
MD5de7428b247d3e209fd9988cfb8050f2e
SHA112214cf1bb06a873bbb4e9d31f48fb8c88016378
SHA256d0b76eceddd58b3f89db548db0133f2548ef600d010f07c59a69a687db110e6d
SHA512bbc7c105190fc84a8a643fde946388519006719ab5cfb0778c16edb7cccb410420243bf1fad71d9d25549911be9e3046f97dae7b0e3d3db63446abb2e86d1afc
-
Filesize
996B
MD502667851d66da4a0b9a5a97d5549e08f
SHA1ebe7a139c4bb479cf30e4614d91a11ba9111d62a
SHA25675f7387448168515bdc3739e6eca953706330e18758b01c17fd39bc1c897da9b
SHA512d0d3981f749f790e429b57d101a3c317b154302614b7657fe1b00dddbb95c7503967fcf03b5e56ed82c624a16a18910c1bb2687378f8d95c183cc36edc276bb6