Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe
-
Size
186KB
-
MD5
f2cd6acac314ba9b13408077684e009d
-
SHA1
b71ba4738ac34b22e8fd183947bcd6bf41eb7d59
-
SHA256
bade959efe3936aa50fa7d4cb08ff263b919e9780c94a1ff62ef2226214ab9f8
-
SHA512
57f5d0cc50c8ae1b5ea74446f1b076d20a1a34c851661ba774c2ff819c763eb1f4258cc5cef3257bfd0c7252a86fbd431155178fa3a00fd1489ff213e808f621
-
SSDEEP
3072:YuG8/3smz7a02gwm1c4w/BqkyBrioPp4GGcCdcqU9qHK3qhLwzumNJV9LjZaBB21:xG8/Pz7w3m1c5COyBmXCqhLwzvdpZc2
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1864-7-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2532-14-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/1292-76-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2532-77-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2532-172-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2532-205-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2532-2-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1864-7-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1864-5-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2532-14-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1292-76-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1292-75-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2532-77-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2532-172-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2532-205-0x0000000000400000-0x000000000048A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1864 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1864 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1864 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1864 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1292 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 33 PID 2532 wrote to memory of 1292 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 33 PID 2532 wrote to memory of 1292 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 33 PID 2532 wrote to memory of 1292 2532 f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f2cd6acac314ba9b13408077684e009d_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5504c23f0be48b2b6b8cde5cadb66ec98
SHA197e0b7f8de85ab53d922d35bb478ece8a7ada471
SHA2563a6d330a3e772d3886cf6fea946208e820671a92eabb74757916737fb2ed4449
SHA51200d975571d9cbfe4bf77075c492bde99ba38d53a6d563be68815abbcf84397cee62d90c9d5e5053e84c3b7cd47d67269782836a46bde4d0168877cfe10b90ca1
-
Filesize
600B
MD5f41dfcc82f64a13acf0d77fe69150263
SHA142693c2e928e0cbf877165c4d2592e8fbd4221d3
SHA2564fe999a029d357da124d2aa148c5d29636807cff0b6a2206d7eaf863c255b717
SHA5127a68ad4b9e1e6aab3fd9ec02eb7d8356bd85c80487ddf362cea857f9727cc87659a9b20182c1fb05d2a932bae98503a4f5cd074a25e3054cd367496733c3aa24
-
Filesize
996B
MD57ebac1b7338ed15f0e2c316fb735d90b
SHA18e7e54ccd91c29bc0c01abb6fa2a7200fbcb9d87
SHA256f822ed3488781d2dd9f46183e0ea4b3041b4c1893a901a0bf13d825352902053
SHA512f53539ea945c27b3c6fb172c61e037b907840ddbc85c4e9852b5cc337580e99957b2eb919f289029a7ee470029d2ebbc4a3347fa348e0e4e91d651074f258e7c