Analysis
-
max time kernel
2s -
max time network
3s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe
-
Size
373KB
-
MD5
fac01ac50a6254ed05db034d295ab301
-
SHA1
f93bd6f6d9274903a512a7526395de9ff5805b51
-
SHA256
239b33dea14938ea65420636a8e104208ba81579348482af1f7c7c8911883af7
-
SHA512
f8f7126c106b649e3ae20be3677a62647ef160d235313c7fbee608af3ccc78e737d89da8ea9d8ec0889d8c514248f475e60450e70e290190fb89d2bc2ad670ff
-
SSDEEP
6144:2bN8NUMcpstzpvjJ7fRJAfXYgyHskta/zJ9AI1JQ0DUL:FNUvsNprJfAEHsktEuGS0oL
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 1 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2796-73-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot -
Executes dropped EXE 5 IoCs
pid Process 1428 bpfull.exe 292 2 Gansta.exe 2544 3IC.exe 2836 R2R.exe 2796 R2R.exe -
Loads dropped DLL 24 IoCs
pid Process 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 1428 bpfull.exe 1428 bpfull.exe 1428 bpfull.exe 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 292 2 Gansta.exe 292 2 Gansta.exe 292 2 Gansta.exe 2544 3IC.exe 2544 3IC.exe 2544 3IC.exe 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 2836 R2R.exe 2836 R2R.exe 2836 R2R.exe 2836 R2R.exe 2796 R2R.exe 2796 R2R.exe 2796 R2R.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Program Files (x86)\\Internet Explorer\\lvvm.exe" R2R.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 3IC.exe -
resource yara_rule behavioral1/files/0x000700000001941b-17.dat upx behavioral1/memory/2600-18-0x0000000002230000-0x000000000223A000-memory.dmp upx behavioral1/memory/2796-73-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\lvvm.exe R2R.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpfull.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2 Gansta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3IC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2544 3IC.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1428 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 31 PID 2600 wrote to memory of 1428 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 31 PID 2600 wrote to memory of 1428 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 31 PID 2600 wrote to memory of 1428 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 31 PID 2600 wrote to memory of 1428 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 31 PID 2600 wrote to memory of 1428 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 31 PID 2600 wrote to memory of 1428 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 31 PID 2600 wrote to memory of 292 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 32 PID 2600 wrote to memory of 292 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 32 PID 2600 wrote to memory of 292 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 32 PID 2600 wrote to memory of 292 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 32 PID 2600 wrote to memory of 292 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 32 PID 2600 wrote to memory of 292 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 32 PID 2600 wrote to memory of 292 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 32 PID 2600 wrote to memory of 2544 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2544 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2544 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2544 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2544 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2544 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2544 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2836 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 34 PID 2600 wrote to memory of 2836 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 34 PID 2600 wrote to memory of 2836 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 34 PID 2600 wrote to memory of 2836 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 34 PID 2600 wrote to memory of 2836 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 34 PID 2600 wrote to memory of 2836 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 34 PID 2600 wrote to memory of 2836 2600 fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe 34 PID 2836 wrote to memory of 2796 2836 R2R.exe 35 PID 2836 wrote to memory of 2796 2836 R2R.exe 35 PID 2836 wrote to memory of 2796 2836 R2R.exe 35 PID 2836 wrote to memory of 2796 2836 R2R.exe 35 PID 2836 wrote to memory of 2796 2836 R2R.exe 35 PID 2836 wrote to memory of 2796 2836 R2R.exe 35 PID 2836 wrote to memory of 2796 2836 R2R.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fac01ac50a6254ed05db034d295ab301_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\bpfull.exe"C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\bpfull.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\2 Gansta.exe"C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\2 Gansta.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\3IC.exe"C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\3IC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\R2R.exe"C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\R2R.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\R2R.exeC:\Users\Admin\AppData\Local\Temp\nsyCB5C.tmp\R2R.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD596329a4458b424e27f103e4c9770f988
SHA10a6e7a79e04a82b2c4ebe625478003b3ab0e9fbd
SHA2561d4ca52de476e89c9e181c28f051ee06144e706e9a6f039b142500d2e853eee8
SHA51214da66cf0ea0cec1ab90c3ec450f04f7d9e1709ed420d86f311a8e745298c8250c1c88b90c432ffdc469f392a6de125748b29ba6b4e082ad94084eba018e76fe
-
Filesize
6KB
MD5bee76c79e2e63e198038e01f0d571038
SHA1fcffdd6bb030f516a46e9d303ebae2ab33af222e
SHA25650a3c7134460bfe5f2840bd8dc957edfaa76da5beaaff70f8da5e0fef80ae876
SHA512dd2e9488ad365c02722e1a2466acffb8beaf4dbb68d7093e01c50cd915418ca0642cb6bdd43f2f2b014455803f3c69dec24ca9dfee11bdf7790379181cd2f6f9
-
Filesize
219KB
MD5db592037b5526080b12b57dde54ccbc8
SHA18d5472e088c07641e26ade451d251745c7030fd8
SHA256d6b46a9ea3a5843e53e7a90d389f9e6061ebecfb197b7da6248f2876d15d6007
SHA512dd12ee9eb37d59004111ba28c47ff0470e6dbacf047f1af1af99b932ed7172be8cfa3df3f1550eda3d3448cd976395a4a8f46059a094d93be07dfebf8da00b32
-
Filesize
170KB
MD5db5499ebbfe3df8ef3f407422fab6f68
SHA19fc65b5092099782b80280e6cdaf109a89a16cfe
SHA256f7644bab8ce7f0927f045c6c0ff84cbe45eb471d071c0eada673e9af06e8d7a0
SHA512e132462dd5ac0eb36feb2bd92c004056dc164cd96546455d5202da7621436e06a811d94d8c440e71d429acce7dd8d18bcdf6c92aedc251745bda9342af7aa260
-
Filesize
3KB
MD546e07fd3a40760fda18cf6b4fc691742
SHA153ee1a754bf5e94fa88a6ab8bb6120b4011afcfa
SHA256bd7ca609d2fb63e14d08acab1091579c23e298b4fa2ac1e8d2daaff94fc107be
SHA512ce13f6527cbd13002dca00b71ab38ab12e3f3f7138ada0780ad3f40e7c49946c018a00782ec957b1fd123fb439aabc0d9b3660829dabf10ddcebba08d6e2fbbd