Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe
-
Size
187KB
-
MD5
f038c8abcb879e38bf27acb8db28e2a0
-
SHA1
1c1fc5e80fd8b284607cfbaf9b8bf9b0cc58cdb4
-
SHA256
bd8c4f03932fa0171cf1fbd040d50269c1e3b7c7d84b04975753b3247e4652db
-
SHA512
637d73485aed793f9bada597a58593d8f5a0a9fbae862e7dea46fc6864c933bd5f84babcc1355d7418c5d147bc10732bb1e6408ad2792ed744011a8775d60f8d
-
SSDEEP
3072:fb9fR6vPhkm9gDdMM9T4wYkgVGIeuK9RWZBmVPKCuoyH:fb9J6BkDdMMCwYkgwbu2VVPnuoU
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2732-11-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2732-10-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2936-16-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/3000-95-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2936-168-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2936-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2732-8-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2732-11-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2732-10-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2936-16-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/3000-93-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/3000-95-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2936-168-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2732 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2732 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2732 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2732 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 30 PID 2936 wrote to memory of 3000 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 32 PID 2936 wrote to memory of 3000 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 32 PID 2936 wrote to memory of 3000 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 32 PID 2936 wrote to memory of 3000 2936 f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59767935f6082a3d7e72d9a89ccbe761e
SHA19609f2326987637a6721891d5ae2a618c779a312
SHA2565dba7e4edd859ad47dff80a361c51708017c1777cdaf0567d4c9022f0499bd3f
SHA512519dfda71cf4e6cc324dc59d1a187fdbbcc180f19df763666067d85458e5cc14eb780a4a54e22886cf5927eaafa5403ba659a200b854a20f3ef821337f67b1c2
-
Filesize
600B
MD5ac6b8b88b3616b6f86081fbb57f2e0e1
SHA1c84c1f482457895f72dfccb058338ed5c79b03d7
SHA25649b2d2faa4b0bc3d7946b2eb562f36771b9bf19cc99802814210d566f0a6961a
SHA512693b982dd7d45d65c4f75fa76b4d999c1150dfb9562b9946c2ea64fa062a0766dbe2581dd8adde50145a272c526a700d2c5cbc116eebd55413b5eedf23ff0423
-
Filesize
996B
MD56aef75b55eb9245a769678f7233257d6
SHA1997ab80077fff18c0f49e1a6a1410ba2672a4c67
SHA256c3a4073eba801c2cc0c5791cf5fee45ff55e7dbbff3246ec23e8c6775d2d9c34
SHA512b557fc45c2e19ba7e680f435ee984d6c6a0038eda64ff168d5157652085fe55200fa91f9493feb8e195fe5dc081396d05195d020e6bdb3b922bef711475419eb