Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe
-
Size
162KB
-
MD5
f0ba0294512bd9fc5238ab8526b15981
-
SHA1
1e1ab95baca90376e874215c32b12690a897ac67
-
SHA256
9592321c69d2a5ca94e13795242f4362b1123d0081b906c0f3ddcc80985d3c4f
-
SHA512
fd62a0ce7175c77c4fbd4d53facc72ec01084d0c056ccdaa700b91c41cc0874d3c23524d30b550a70cf658a9e98a75c49c79c375efbd6298eda6755ec5052059
-
SSDEEP
3072:8/zfGU6FegH8rFAQ/3TkeyaRF/R7suYCoXZ0ryUrYhaqiVfkJ:8/DGUgegH8rf5LnYCg+X
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2452-10-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2336-15-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/1448-76-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2336-139-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral1/memory/2336-187-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2336-2-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2336-1-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2452-10-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2452-8-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2336-15-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/1448-75-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/1448-76-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2336-139-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2336-187-0x0000000000400000-0x0000000000444000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2452 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2452 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2452 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2452 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 30 PID 2336 wrote to memory of 1448 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 32 PID 2336 wrote to memory of 1448 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 32 PID 2336 wrote to memory of 1448 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 32 PID 2336 wrote to memory of 1448 2336 f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f0ba0294512bd9fc5238ab8526b15981_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8b48e40ed460da2178922c4e97208e3
SHA123e52a3f55cec002aa7aca3099b962eb8b708822
SHA256740d7412f2445b21cbca67f18c709acae8e4df710bd0101475c551d6008c5012
SHA51270149fa6c203268f9027e9a0c6e6fe107e4dc25046ba2deafe55b708321f4afe78a531e51f76b42cc2a88ef833d6cc2261c8c8ff3375cda1b8d5462fc454ef0b
-
Filesize
600B
MD50224adcc95c199e6cb4a733cab56c544
SHA1c1f636ef51e98f788377c997b55e26112612e0a2
SHA256d560a77063b4d98fc53f9dc0ca47e2fe1b54194113f261748048e1f39cdc2b0e
SHA51241af3fc251068529131efb86b0ecf67d6d9f77e33e2db1dc8cac02fc95db93d4cb7b6d8e84c03fe512475f4c67b0cb589e7ea7cf091cfae100891c7e62f951be
-
Filesize
996B
MD528b280edbf044ca4be069cdcf478a903
SHA1062607bc5bb0b4dbf9f94213f8cc332b46473e37
SHA25659615a5f5c8a300fb1d84ac284e6f3ca551633220050157eb361dd0706fa50b4
SHA51260eaa254437055e514d4c326f92a7567c748e3076820bb0f6fdca8649e408bf707facf1fd572169d3ee958e2c4f451897ee5dbb63e8ce69cd5fd9be6592dc3ec