Analysis
-
max time kernel
140s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe
-
Size
192KB
-
MD5
f94050e6245132ac6fbffc77d5955f4d
-
SHA1
5ea83c94f4f617682fafc192c9e368f2f5e427ac
-
SHA256
5dae77a0cb286a0ed1e430bdc78c4bd986f3217a3d1c7413997a71b455071c56
-
SHA512
ed63c3e006836e19ec19edd55859107d87df65333e8d70acc9d255ebe153cc90a1a64ca2cc375891a9dd5d4fad217a77d1be1b7e543a492697470077a08ae9f9
-
SSDEEP
3072:rKtHuR794y5aCsHXeuuISPXS7hlIzF0jEA21tiNuvR17doa3pOR2vLadLduFwa7O:rKtHY79J5anHXPu9S0zFM9M0NuvRnL3m
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2288-15-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2288-13-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2684-16-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2988-87-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2684-88-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2684-150-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2684-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2288-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2288-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2288-13-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2684-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2988-86-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2988-87-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2684-88-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2684-150-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2288 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2288 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2288 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2288 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2988 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2988 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2988 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2988 2684 f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b2817501d838810e65374244ca7da23e
SHA14f045020ac74dcd4e7bbc0045869cec30b7b4e5b
SHA2569ce1b38dc7d11a4a57be3473e6f4fa583c842f2875683f0f144d954d8c774cc0
SHA512de477be09e268c1f5678dcf394b7850a9386eacb5b56473d0a679c0e841db6a9a49a7ab876868f9f11089d271c13bdaea7c77b24eae90536285ede973095ea02
-
Filesize
600B
MD57ac25f7e8acf450bc690730e353248cd
SHA1b77afd4bcc72323afa85728d5502e6e2d5beb566
SHA256d6c4d6dc3732e3a87b0dfec7ad1b3c4ad17b1714be371b9557794b9bf73e2cb6
SHA51261658fa845ca6e4af56c83dd4d89a6d771a381ac491f544b410fd3a927153652ecf2142567c892addc38e59ea29e2fa7ec94153c23557b1781012e57b6e6a0f8
-
Filesize
996B
MD5c3cdf8269aa844b51cd0034534f67adb
SHA10651ad83d489439e3679759e6325ed8d45e8237b
SHA256a10c7d51fd0f7b88f6c106ca0359bb828458c749ebaeced947ce7286ad4649d3
SHA51228d43dccdddc8a81e9aa4792cf2e53d0fb8a8f153dae347d84e83032721942d80eb6848013c11f35bc6ca8a7a5412f9723e6b68d45844cf56fe49eca3b2c2a56