Analysis
-
max time kernel
140s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/12/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe
-
Size
171KB
-
MD5
f1fd577f429914f70f4038ee16d07b8a
-
SHA1
2831f0e60bd34e6afc2ed46b57134b84ca0077ea
-
SHA256
c0ae6270f99056daf0f98ae5a411f8a70b008c81a027903003d3fac37d16f56b
-
SHA512
7639a226b57d9ac94543586bc5e5d1a288acdded7eb089894b6f566c6ffd0bf9d860c366eacae5f8e4a42e3f4949d4aead0c572cc5cccf1f01065e905923af2b
-
SSDEEP
3072:sTGJH2PdRnIOKQHrlcMl7lSF00/pmbX559MgUhfP9/YQYh/bfkkP/:FWY4HrJ7lr0/pmbX5fIP9/Yrh/bfk
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4704-14-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/3252-15-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/3252-83-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/2284-86-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/3252-195-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/3252-200-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3252-2-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4704-12-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4704-13-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4704-14-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/3252-15-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/3252-83-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/2284-86-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/3252-195-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/3252-200-0x0000000000400000-0x0000000000444000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4704 3252 f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe 83 PID 3252 wrote to memory of 4704 3252 f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe 83 PID 3252 wrote to memory of 4704 3252 f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe 83 PID 3252 wrote to memory of 2284 3252 f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe 85 PID 3252 wrote to memory of 2284 3252 f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe 85 PID 3252 wrote to memory of 2284 3252 f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f946a143a6627e3e4bd357efe25436ac
SHA14396244dc59e4c81543321f30823a240226ac946
SHA256da748e38fa6a6a636d24fb64044299a80e49e07b28a600bd81bcb34e3a5d3bc4
SHA5122f586a33e08b82a188b9757c1ebf3f3c9e8c3e7daaa10a2d69c312ebc6fc1d5998548814b38c2b04248f1389195a013bae27cb4483c88f3e99e8b8130158c60c
-
Filesize
600B
MD562e4a2c9a1847808cd7672b00506be69
SHA16885c8d2b58e56382cb6ac044b6b131af9b8480a
SHA256b442baa78a072fd8626c88c7367d374d30b19226c0d10fe9f40acec034024efd
SHA512d728f281a65f870a990046f8390db411aeccd06f800bc133abb02e57b49268562188c178512a4fd6b6b326a726cd94752226ea3329c5eddb9bbb95316a57b942
-
Filesize
996B
MD5ee66e1d1da7b8377e298fc76ddf6cb89
SHA12610b6f1346afabf668911b508a15bef1c93478e
SHA256e0af191fa0b4f710a61a6e2b46940f0ba11d278d07ff69bb92f096feb3cb6c48
SHA512fc9cbaeec689aacad3b95759f05d1678a05f964fd6931e4cf5a06d6c5956049145531a9d6c0123f4f167568dae71b048cbf97fc9f5ef71f95dd75cbdbbb5db8f