Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe
-
Size
166KB
-
MD5
f276498ca3368e3b3cae395669c90113
-
SHA1
3959fe3c96c57e28009b09d20386e8e87b730479
-
SHA256
941ed418d8b00521ffef714afcf38d5c85bfc708b32b2e113c743e6aecfc203d
-
SHA512
cad6ab73ac04daabf1620ada048f9856ff1edc3e541d0af612460ebcfaf5da39c82202eca59faa066e6a8fbfd2323a020722b953716cbb2236016a7ac16c6090
-
SSDEEP
3072:z8qeqDUP9qIBQUnwQNUWQTGHXikSh/8r5pvEz/GtelvG3s:zReq09qIWUJuGHX+Or5iz+T
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2832-14-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/2512-15-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/1112-82-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/2512-83-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/2512-193-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2512-2-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2832-8-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2832-14-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2512-15-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1112-82-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2512-83-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2512-193-0x0000000000400000-0x0000000000446000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2832 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2832 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2832 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2832 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1112 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 33 PID 2512 wrote to memory of 1112 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 33 PID 2512 wrote to memory of 1112 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 33 PID 2512 wrote to memory of 1112 2512 f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\f276498ca3368e3b3cae395669c90113_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\f276498ca3368e3b3cae395669c90113_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f276498ca3368e3b3cae395669c90113_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54aaa31d5914c3392a2bbb9c5de88cddf
SHA1f82e56b041ed1ac458b5a14c044df235d2424f2d
SHA2563aaf48df4ee2b2d9e8d4da8d4fc720142819cff9ab5fff8a1d3126d68408e9c5
SHA5126be550325e753ca346ceeaa426e521fd99f4c7b1cd177716711f04f10dfe7fc6fec93b5de3128fceb18de631d1109b0d9e47876c3bc514ceb07bc5b267de793d
-
Filesize
600B
MD58eb487b71032c79a1da88f9d5a4d94d1
SHA1101c560e035ea0fd657b3f6da5e9401c2739cc6a
SHA256ca3aed00b7556dd21b3cdb2f8edc34ee0f087131665d81364593d1c6c0f1921c
SHA51289ddb93dc386e34c4b864d87576856ebc7b35290d3ae1531b8b72a35c7a418e961e9ffb84c2f573c118865eb1ba7df5fdac198fba911ae9e4af9e06d9dae6893
-
Filesize
996B
MD57365c54695c14b69ab8b0125718a4a1c
SHA16d646f90adc28e279447e07a490c3d0ac3cccc21
SHA256186ab3b2b5f73e8c94169a634d5710bcbbd724f6ecf6494631fd54edc576bc56
SHA512aff4f04d3f6a0d2ebd9faa68de7198e0c73283407d8f0b661d5bfaa945a74447197a73e0775f07750e2dcd269ccc94d6a18447d4fa7226ea0608851336fd7943