Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe
-
Size
155KB
-
MD5
f27e3f76056154ebca5131a10f2a0ab5
-
SHA1
3f24c3b5f80593ae6726b2c009dae7d9888a2c77
-
SHA256
be3f5828d78904e924d91dbb266996cd58110fec81320af5a3f2d700f2b834d8
-
SHA512
4db527c42097ebc011b02507c97ad814c5c875061c567df6c2031ee6780a7b853bb2485007cfadf70515da34abe09659923c2019f08908b33750ac20d2d39b63
-
SSDEEP
3072:vw/9LWqGjWmpYCMg9kQyaW6ywE8LU/1Bd8A9GRikTlqZkWMwrw7DuC:vwpWqPmuCMg9kdIU/1oA98JWMw+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1532-7-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1392-18-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1392-79-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1280-82-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1392-196-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1392-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1532-7-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1392-18-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1392-79-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1280-82-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1392-196-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1532 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1532 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1532 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1532 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1280 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 33 PID 1392 wrote to memory of 1280 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 33 PID 1392 wrote to memory of 1280 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 33 PID 1392 wrote to memory of 1280 1392 f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD51d958f874f0689aeecaa68cf9c27db29
SHA1902c451359fee78b6979890ab4be03d419344e7b
SHA2568727e29509d2ac1d3aa578d2bd92dd00c1733d9f31e4390abd7c71301339f30b
SHA51266717fb149b17dfdd7f8254a38a7e0913bcc256da0e9f83ed2892fa29774e2fc04f50dfb8472fe38ea1a1609fbe4991ef26e7d982bfa22a81e3dfc02a1d9ebc6
-
Filesize
1KB
MD5d39ca678dd8098c54e21d00d27612e95
SHA168bcea5326d420083a14e56c638a2e5c8138b831
SHA25661c493d735c535431f1cd8c39392908782d83cb5b16f62786483fd0016a62ba0
SHA51276400d1dd66a923bf872eb2faa6909e8c6e06f02d6706325b04bdb258a87abc8db780cce3d190ad7b8bc92f561573dd0595d5698108a2bf294577a76dba87938
-
Filesize
597B
MD5f05f05281b70cacdc2c05ac5e98c6a03
SHA14ebf84ec6890e1f01c158acff2a7996710cf9175
SHA256b8a7f5635874dd6ab55d1185c5069f18703266c083ce99e625ae09e8bcc6f048
SHA5125a3dcee260f8101507669da3cb687509c749c1ba7f1005fee81b5f701b00b8711da4c7ff6ce2b097d35fe1689c999d713094f0c1348b90d0a0bed6705bf873e1
-
Filesize
897B
MD5aa979c852d01d0d17e313f8c1b8a2c61
SHA16b0ea8379f418ffa9399c87cce06e327e3375964
SHA256435485e442272e6d894a4044d5d648c8b42b900d1fb78efc0a7ce584ca976933
SHA512c120826770c95013dc2a7cb3071cd1226901a7965504e91ca6e88e6d13cd76997cbfb57f28d2208bb4940a67d34bb6360426b94d7979746ee41f51706dede3b0
-
Filesize
1KB
MD5b7b08f4f5b38a90ea50f4718e2d47f4f
SHA1666a39c030047295bc9a7903b96372275cb0ee28
SHA25673a818139a7a32d94656dad9bb5dbf85ae083958abea4840a26ab3a27f24010f
SHA5129c853a3c6fc1683fc8b17c58203569bec1f57414b4dd2569b74d8098940aeee8a32e273d4ce6da7f1645486bbee79bf3be2f9d49e40c37dcb23961d3c15212bb