Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe
-
Size
179KB
-
MD5
f3d5bb873a19e23a6e7b6db9737411d8
-
SHA1
93477fec59e1e3c689a98f576dcd84a2f3eb2adf
-
SHA256
e1988e0421ae089847dde234008e091b54d58f54c1ae663dd6c521c7d5a8e945
-
SHA512
2fd719d9a246d8a4e538d26cf58e7b61e27a4ce9cc8fd4d76d5332a8dc3bde82b78bcab8a3e2e6b2ba0f5803f6f76497e4d7cbd5eeaf1094f943d2784a899b91
-
SSDEEP
3072:U6kGMVrSa8XbK5R4H3XSp7FyosqblHa7dGdl3NhJuwLQp6lyFV8aM2iU96:U6pMd38XbeR4HsJhbl67dGrXJVlqZXiU
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2704-5-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2648-13-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/300-80-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2648-81-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2648-180-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2648-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2704-5-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2648-13-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/300-80-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2648-81-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2648-180-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2704 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2704 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2704 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2704 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 30 PID 2648 wrote to memory of 300 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 32 PID 2648 wrote to memory of 300 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 32 PID 2648 wrote to memory of 300 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 32 PID 2648 wrote to memory of 300 2648 f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3d5bb873a19e23a6e7b6db9737411d8_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57ee0a2000f95d234c1c79ef77fda01d1
SHA1823a20fa459a8fdf8ff4cd60dc18c0c00f50ae2d
SHA256505ac26bead203f7caf699c744c43f9bf128cf40fd2f22c1c53a838fac21961e
SHA5125708ddde158e1c5ba6c2c641768c18c1ac6e632b983a9f66a87557ce6db4f93decb73ae3c717507840a0886cf9a3b155458d73a156fc1fb076c226b2dbcf6d6e
-
Filesize
600B
MD556079351d7a9591ce6ec8568c6b65730
SHA15f98fe6bd36d5c004728be09644383e4bfeaafdd
SHA25632051bbfb9ec4c3249e6399f3455802ba0851a27d7c9eb6ed75e44cc4c1dbcb6
SHA5120105e4f6df2c40f579ff2283477a87dd7dd3354eaf10be19fd9945e43074f7c69f040643a43b1ae774aff73a2121114e2d7dbf9944c100a295798bf4709b19ee
-
Filesize
996B
MD55aca2cd06df5f547dea795b3798199b7
SHA16fbcb01d3e6469ad93bf719ae4718e5522795d79
SHA256cc028f5b01155d2d651c231063b01513a4dd79228f7acf86ac52cf6cce01ea05
SHA512dddd0fda4c96bcdd34b4ce9a1ce4beab5e8aa028fb323e766ef88f67c942b3bffe22a02debdf3290b29e0ca627472793b055e74f629cfe2f354fa6175e161194