Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe
-
Size
179KB
-
MD5
fb34855b4d25f6d0b5e9cf19333c2567
-
SHA1
76adab16924d612346c0d328bce496be8086ceb8
-
SHA256
630687176413d8e68dec7840c3c88e1f7a65f8cd6d402f887591b76bf6465d35
-
SHA512
3e9ea5c5d08eb80c3d32ef7c7574ce88b872447142303bef0f63248c90513f57a8a90a1ed2625a91e86ce8e5e6385bba6d7884b1ae780f9244d941e82dcf60e8
-
SSDEEP
3072:H/1Y3dTmqeHrJ8rMG9gdy56SineLakifm510IeEUpZ8+SQMqJAK0V:9Y3YqeHrg2sOneLamjcJ/8+SQMsAv
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2808-14-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2996-15-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2996-77-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1808-81-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2996-188-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2996-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2808-13-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2808-14-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2996-15-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2996-77-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1808-79-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1808-81-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2996-188-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 30 PID 2996 wrote to memory of 1808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 32 PID 2996 wrote to memory of 1808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 32 PID 2996 wrote to memory of 1808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 32 PID 2996 wrote to memory of 1808 2996 fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb34855b4d25f6d0b5e9cf19333c2567_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD524eebfae4bf9051103e6684ae6bafc6c
SHA1512c15659f91135ea72be7ae18c8914881022549
SHA256f7ee1b7aa15098587d2847b1928aaeeb4b38a5d4e602482391c67a591d405d22
SHA512f1e47d3d61c8f60ba227bc641009af03cc83e5a1bcfe59bbea36b4b2d1116498a9ca386debcb62b42eb9cd71f4031645d33af467ce7b69400512d2b33353c69a
-
Filesize
600B
MD5c9440ab275515d959c0a40933bdade6c
SHA1c3067d055e4ad4fdd7d4b16df3037df40ad9990d
SHA256ccd14a971f8014321bc430c968a20ea4ad7c40c7839d7fc609514e8c9eaef6eb
SHA51262537a85526050277c48452abea9edf6cdab22ce8fd502d55fe208b21e9e15e935a0b37770a991c77583ad3fc4d36abbfedcafa9c896051039b0aec91a946a40