Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe
-
Size
182KB
-
MD5
fb5796499b1c723e3caead8b24b70cbd
-
SHA1
09ac2ad13de31671ca76919cf77381081e1c6adb
-
SHA256
b21d50173ba7168e8d034c92dd318fcef281b9780b7f4413077166a8e68098d2
-
SHA512
0c91a8f707aaac735773a606569b0b5ab590c21b3404826d6c92aff47679b877a44019da73e23abf1de7be47bbe6e923e1440172d941a532d78e930626836382
-
SSDEEP
3072:/ZPv0fuWnVXboLY01H/UEznTnezl3UGdOdoAewWBASCTUPG9sF5csMEOvJJ:/9VCkY0J0ladxSqA2sMEI
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2396-14-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1304-19-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2844-97-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1304-195-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1304-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2396-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-19-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2844-98-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2844-97-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-195-0x0000000000400000-0x000000000046B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2396 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 30 PID 1304 wrote to memory of 2396 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 30 PID 1304 wrote to memory of 2396 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 30 PID 1304 wrote to memory of 2396 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 30 PID 1304 wrote to memory of 2844 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 32 PID 1304 wrote to memory of 2844 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 32 PID 1304 wrote to memory of 2844 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 32 PID 1304 wrote to memory of 2844 1304 fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb5796499b1c723e3caead8b24b70cbd_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5c38beb7b4b1aaefc5f3e053e478d8598
SHA162475f5985402615260413a70db609b050108d98
SHA256b2219680882a713a9e2a42f0b44ea247a92d0b7a4f2330e8eaa32f6bb7fd3dc9
SHA51201763bbd4d466701392287e26a57f4d9986d2208810f022884796f44751920b3ef917ff03410a7b34f2604680472580aa02161a79a1ac227fbaf8441bdaae455
-
Filesize
1KB
MD5909dd7178491cdf528cc2598dc76311f
SHA1ca73a737f1f4dcd883efae653367327d85d93cde
SHA2560460738567da699f112eb9a82a23d6c1c5648353d6fcc6565146ad807ce5361e
SHA5121c986bd70a75401317ef03208baeb6b75380a99ae4c9ab2e324193e9a6543838cfc2d2c5f8742bf2c8d372b3f1d1a336538569cabfc952ac067515d6315e1d74
-
Filesize
897B
MD5b4bb26f523ffebc8d1cd21124b78f4c7
SHA1b7dd20b26db014d4748ee95746948ddebad9d2c4
SHA256158491ba1443904f04353edd70ebeb2f1e63b2f158665369ea211d51387e3de8
SHA5123c2616f8eea9b0bdff4d8e18473502c14c4dfe63f1246afb7d42065cc02f8ab063d1cd147faf85e7115d0abbd8393b2c53e84f527fe01e2695fce8227e3c9e9c
-
Filesize
1KB
MD537aa4c494b64a73359cc27df9c7a8345
SHA1d13ac932914ad1a9dec35c9484b11f415ca9baba
SHA25629ce7afd7b070d31baef317afadcc40764cd59ef877ed02367d477397c347a06
SHA512a7dca8f429dd1db3432bd87bf3792e5412134b1c0d0f111f091856d6e24374f0f9f29e490c58192b8916ea6aaec63a54f825837498ba3ca4e71691f3d03431a9