Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe
-
Size
209KB
-
MD5
fd73f3f8e30c505587d64695a63dab4e
-
SHA1
7bcdade370e613aba1c932003f989d191f65d04a
-
SHA256
b018df0d0bee77ecb61b919b4c3d4509f38834c83ee019eb5032f2b08398f46e
-
SHA512
785ab609a4416ca4eaa386ccfd161561ecf8f1864a30130b6757f7560cf74708dc235019a434aabeaf33092bf977dbe1683acaab6f52c1c154e5dd0dfac8e5ed
-
SSDEEP
3072:wf1uE1rB5hoRWVuqQYabE0TMCI2QPnDw4GzvwDmfCkipFmL+BsIWmnqiSTNlSVyY:ww+lvAvoE5IZnE4cuJCGtnai2XwF7
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1192-7-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/316-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1844-82-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/316-192-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/316-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1192-5-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1192-7-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/316-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1844-80-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1844-82-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/316-192-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 316 wrote to memory of 1192 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 30 PID 316 wrote to memory of 1192 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 30 PID 316 wrote to memory of 1192 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 30 PID 316 wrote to memory of 1192 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 30 PID 316 wrote to memory of 1844 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 32 PID 316 wrote to memory of 1844 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 32 PID 316 wrote to memory of 1844 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 32 PID 316 wrote to memory of 1844 316 fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fd73f3f8e30c505587d64695a63dab4e_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD556d3da6af35e1df2bd982ed42770239b
SHA10b42d1b6d552edddd387e6cc5603e75a7048ebac
SHA25649c774c136d5d9aaf76b1c03e568c3bc3fb37505cac07d1587867b6dbb621887
SHA512c43898b3036ad087e1267a86ed1f5d57bdc486d7b18aa48b2b26cca7aeb70881f708f579d5901355f2806527eb6cee8c968aeae3e4d887bf85c368f86ce089d9
-
Filesize
600B
MD5ec86a38a2848576b875c8d2bab8f4a4f
SHA10483f84903a500291feac2a576fa06e97523423d
SHA25608c6f0d72ff1b3d456ab94f22866a5fecc41fae11218214def4224aa3ba30003
SHA51264dec0d144989fcfec07ad9f28297ba6a6dfa228c8ad834f9e1098b643480e85fd874db6960809d51b70256f128434ca3fba6f49bba19deddc88ca86e569647d
-
Filesize
996B
MD5f9099f1aaeac3f98fd39a6f8b4068436
SHA1635e8e85d7dae182ffb03c9e623cf2584f40ae5a
SHA25607cde6926fed744f05cdf6bfa803c66fcecc361be03d7d7c847c953661c77a08
SHA5125d47c3b0883ed4558d81ef09e389414b68a956c009d06bf93c98348861e61a0a610ddd6e3a2e9d3c1ff0ac980f18af2e3e217902d0d0ee2ab5fc41c166d25dd9