Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe
-
Size
172KB
-
MD5
f22e44ce0a211e269675e7f83a1671ac
-
SHA1
4aa196c923cb820c5e7c9a73a45ca7051c8995f5
-
SHA256
b4e7d61c7bc8d1de5cef00631f590944604df0a35c1da3c9387f6ed13ba831a5
-
SHA512
4bd2180ee5a98effd5fb643f7bb16cbf7d8d919fb32fb3c350d01ab1e664534f3c24dfaaaf1d2ed7a88d3114c2aaf2f4862157faca9744c3010ed24dbffd3271
-
SSDEEP
3072:jIs0loJfuALqzYjZ6HXg6TdwXy9ngQXcqNhbJVuHE/y/COPfaRYv0qQxA/9T0:7UoNgYjKgmdyigQXHhdoH2yZPftv0+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1652-8-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2008-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/1928-83-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2008-84-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2008-157-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2008-1-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1652-8-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2008-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1928-82-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1928-83-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2008-84-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2008-157-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1652 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 30 PID 2008 wrote to memory of 1652 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 30 PID 2008 wrote to memory of 1652 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 30 PID 2008 wrote to memory of 1652 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 30 PID 2008 wrote to memory of 1928 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 32 PID 2008 wrote to memory of 1928 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 32 PID 2008 wrote to memory of 1928 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 32 PID 2008 wrote to memory of 1928 2008 f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f22e44ce0a211e269675e7f83a1671ac_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD51c256fc5686f96f5ecf1bb2668dad6b7
SHA19b2c94932d3b46e033daef7092a0177fa1ed40b2
SHA2564ef8f93859f1f54cc09d5121b60225f0aa3bcbeb7363fe2e608da973fa9613e5
SHA5128fe49fde3fee30d35b4e4d2f7789f3b420910cb417fc7efcc236fb62b52627ad44ea26b2fd37f19b45deff3c4ad1b4bc5d99ef6b100a5242c993efaff1e539cf
-
Filesize
1KB
MD5de93dc890ad5fc872af15cf08de429d7
SHA12025ee47a5c3fccd63e6e1896215dcce3167dcc3
SHA256c4349a367f419a5cb046d979ddf2264d7910f4f9036e76d68a9aa83ea42724c9
SHA512605f49487340ff394cbdf455838533d23c9fe82d02460a8239b831b92aceb2f6ddbd7a01ce75d0fb1f62929630bfaf53518f877aef689da1c66004c341679003
-
Filesize
996B
MD5f3bc6b0f36019d9d1535255aa798f908
SHA1c7c2593e400726e825d21bba8df1c225cf6addda
SHA25643875e3d9248b7e3c5d6d2b7ffd2072cab2aceca1bfa52fd0cad1bd79fd5e98d
SHA512fd441b67bb2ec52b8bb93b72e200f9955720a035bed022d1eb7633a905c05ca3037c2eab739588f309edcdab038ee4c6323b1da40a278245a56b10483df26f6e