Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe
-
Size
174KB
-
MD5
f64b632e4bcd6d676a51a438462a9015
-
SHA1
3eee3e84f47c6582505e7591d72cc6574ca2304c
-
SHA256
8df01200ef92c91bd5465002baff0c9e45ae5e233da201b436e86ba9bbf07126
-
SHA512
6b39d90cb5ae893966f949199bcfa5dcfbfa8e9dcf915bcf1978ae18354c8bfb4aa8d29f082762a4c777c55b188273943bcff319e52d412d8d65567ff292c5f7
-
SSDEEP
3072:ZVspm8VFP37ODudlEZCQOtBYwJHqB/f4EHZSIwn05ZkPpw5wMDfKsSf:ZKjkuJQO1J03tdrPwMzbSf
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2500-6-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1780-14-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1992-81-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1780-183-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1780-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2500-5-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2500-6-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1780-14-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1992-81-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1780-183-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2500 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 31 PID 1780 wrote to memory of 2500 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 31 PID 1780 wrote to memory of 2500 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 31 PID 1780 wrote to memory of 2500 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 31 PID 1780 wrote to memory of 1992 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 33 PID 1780 wrote to memory of 1992 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 33 PID 1780 wrote to memory of 1992 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 33 PID 1780 wrote to memory of 1992 1780 f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f64b632e4bcd6d676a51a438462a9015_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51475abb709700ab9d64726e04b5c5fe5
SHA1431015c6a8ee94aedac0712921cdfd88954cb571
SHA2560e8bc37089cc6ef83dd77b594e196e056b4df52f27854589786d677fd0a50e49
SHA512389040686d9c0e7b7e3e6244b0d66a969a0e3682f5cea89d28c142be72cd32631382591e2d34cedf1d885d5322811d07a05ad91dc616294aae64c8e7afb69289
-
Filesize
600B
MD52c8118ebe1facaa26283760d6b0d8d55
SHA1863edebc40c6dfccfadc0d5e7eba797f5f636bfa
SHA25653f419ddb298856854e979940d08001acc5e3502d4850d7e3bc56e50b288e416
SHA512987ea8ad1b8514e5bd284091228d340c40d855498a2b1df070e8aa9fd2095e31f2cffeec76d849a9b41c053de0ca2e3709b7af7821905dc63f6c57fc54fd7f69
-
Filesize
996B
MD5c42cd3e407f2f6517614ba688595b7d2
SHA163706237577dee4576c9561f14827e95a35da6a9
SHA256b2a222ea68aba3d55dee99ad7fc053ad52faa2a245288b45330fe053296ad038
SHA5129d200c63ecdf7a7a01bc46893eb71955dc38d978f7f65113926bd52a107f3e5a200e551f938b88991c89bc34c2428d6e20297c8a35a6b570f8e8002ba96a1fac