Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 21:00
Static task
static1
Behavioral task
behavioral1
Sample
f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe
-
Size
209KB
-
MD5
f0ae79bbe8eee0f6521cddf78f9da58a
-
SHA1
b107cc16ab771802270642919ca545116ebce1e3
-
SHA256
96d6de4ad7e0bb8e549a3f8d211fbe909ad12099b22d24306781609b5837e74b
-
SHA512
05a17e9287bbbdcab07ddb16cf090afd0ea3267ea00b3339c4b50dc90fd00cbd6e73dc4a6693871707a52bbdb62704aa2815e6f07eaa6de68725b6d4802657a6
-
SSDEEP
3072:FuA7oFFY/p43Z4V+iU5ZHkvWcgznIYnYXBOg6OBr7X2voeJ0GJoArILaJYEmQ1Gs:Ff/eBn7vzv8BN7X2gZGBIuTmQ1P
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1908-6-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2368-14-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2392-78-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2368-188-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2368-2-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1908-5-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1908-6-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2368-14-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2392-78-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2368-188-0x0000000000400000-0x000000000044F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1908 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1908 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1908 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1908 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2392 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2392 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2392 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2392 2368 f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f0ae79bbe8eee0f6521cddf78f9da58a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5433226e4f6aab954538b6ee0d70a390b
SHA1bfe019f9df396e7d2314e86175fcdee1c8b0bdae
SHA2563dfa0eec2cf5719db66a9e62b5a1ad9df906dd839787bf90a0a7cca5856450ff
SHA5122fbefa39478276e78a4a9910a2180bd5a8dfb5a252941efbd556ea82f9e52cc88bc9d396644b590fbd2439438c5c96156037fb32eb6a0e4ec05218d445fea109
-
Filesize
600B
MD51c72fba53d8818c0230fa02a01b2b6a5
SHA1fe3865d19326e2659d1a9a012b9e2005de8d904e
SHA256a5034536fbbb8808bd0b9b9f888cac431d026643e0e03b187ce6f3db14e6b92a
SHA5129d3d8b81d0a1e7216c60bdfddafb9935e0ccfca008d9992d957509e9dd76c381a4d42d2ecfd55f85a6485cb75e020741b84abc9dea1da24a3f11ec85fe469547