Analysis
-
max time kernel
140s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 21:14
Static task
static1
Behavioral task
behavioral1
Sample
f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe
-
Size
183KB
-
MD5
f5c36f0891a6317732aac5f91f6fc5b3
-
SHA1
b0e5444d865c0cc3c8d582f5c3ceb830115d9718
-
SHA256
ce660a97d153a446018a997dcc8ccb2b69a12d2d65f47315ad3ca489402fb0da
-
SHA512
27fa64479ba5079cd54525d765ae0feaf215e8be35dc8ed07a7cef320e2e8d0944e22dbaa010ee3fafb5d53538bed7209bc7a5a9b6732c427ddb7e5fe7ed9a08
-
SSDEEP
3072:2SABN3qhIHfCqww/XWChNNawTG5gcOB/YkLNLRL9yBT7eMaqnW/AwhM5i:2SAL3qOTj/GoLamxtpRL2WGnWY9i
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2804-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1456-16-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1624-76-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1456-175-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1456-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2804-13-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2804-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2804-12-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1456-16-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1624-75-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1624-76-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1456-175-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2804 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2804 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2804 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2804 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 29 PID 1456 wrote to memory of 1624 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 31 PID 1456 wrote to memory of 1624 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 31 PID 1456 wrote to memory of 1624 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 31 PID 1456 wrote to memory of 1624 1456 f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f5c36f0891a6317732aac5f91f6fc5b3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55f8db78c2846b0ad6a862da43845e880
SHA12db060c24c743dbcd2d96b1de140d60c6a46afa7
SHA2567d42b8721d46e38071931b68d0ffdc5b68f72fd90fbf2a4d1c1e12cb9d25e453
SHA5129592e91bbebe9906891fcc07c3e49ae1750937535a1534e10f110d31ba023d4b34a7e4e3cf0ef096cf4a599ef56bf2b5fca37a439974720d644f8ec96a51439d
-
Filesize
600B
MD5686b358e65016060adbe5913ab57da3f
SHA135635013fce61ee7902134a51ef6e16c21e55e9a
SHA2562568e938ab48ada5ee66bdc0ef1f5c040d57f159e98a44ff30e1e026f29bf098
SHA51279ed8422c7fb7467ba82264a20280087331779cb9e7e8d9d7d6480de413c82f58653d39c5ce47c3a7d270090b769115ce9c18ccab8873fd9af647720edb252ba
-
Filesize
996B
MD5b390bec83fe8a7e3dff5b9a7d33e7b80
SHA122016581389619b1d5e663ef512a6b75220f4f85
SHA256ae3ec01e7ecbbdcc83b89ee566d76632fcf4093686c4af4da0d48a83858ecdeb
SHA512b478767480c45ef58bbb498b1b206542b065d996e3b7a0761f928860d7f9ed61889faa3b050d76797cc119d18bd09423a4671348782cca6e5bdb6202b1a5ebb8