Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe
-
Size
192KB
-
MD5
fb7ef3489999a8c0dbbf3ab3d1a52e9f
-
SHA1
c693364964d2eb6089adbf4fea6633759a2f159e
-
SHA256
b29badfe1d05f069c0f6e0e63771a11c9e65e18241186d952b9ee1b86dc22a9c
-
SHA512
3aea7c967a3218f3ca1222ab06faa2e0f0b8e1dc463dc4c03d75115025c0cd09ff357ec59737b961cee954ed37edc04af317010002c66e64d4f32d93c73c06a1
-
SSDEEP
3072:7ZcAnmLBUnEj04GIYOvqdjqyd8KfG4Sd47pXQiBuAPPOQFJsfoCPB:7ZamnEjJGIbCdfbeopXQiBfPLFyoCPB
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2100-18-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2100-20-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2872-21-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2872-88-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2492-92-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot behavioral1/memory/2872-196-0x0000000000400000-0x0000000000470000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2872-2-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2100-18-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2100-20-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2872-21-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2872-88-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2492-92-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2872-196-0x0000000000400000-0x0000000000470000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2100 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2100 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2100 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2100 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2492 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2492 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2492 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2492 2872 fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb7ef3489999a8c0dbbf3ab3d1a52e9f_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD54f4b73dc271e48ad8adab03e556fe41d
SHA16dea656cba9c4618eb35652c16270937fbb50e76
SHA256ca4cd4c485e81d782d32d6c0689b6d90ff24e7781cf203e699572f76f5a49a7e
SHA51221614df7fe078f2d6db7dddf91e88bed190451c9780490649a97958cf4be386168a43fca6347527aefd5bc7ba075721107cdcc8eb7036edb0f30cf4bbba0980f
-
Filesize
1KB
MD57d0be2217716d2ce6a2cfdc7c4e1c888
SHA1d7001e638f1e3fd7322539e5e6a5ca8a40b14acc
SHA2569af407028f600e4dfbb2113ee99285cc49b39f58933069df68b8cbe58160382c
SHA512606b2c12eaf64e9dcb5f374c42d640a90abbf237bc83e231e40ff5edcab4de0f45deffe261085348d7cd5e0634c5060071c3ad35b59a288ea98627c94b17285e
-
Filesize
897B
MD50449dab069d85d2b8ec694b8f0eef923
SHA1d0d6cbd943a2103c050dffee8842180ef4cd6745
SHA256fbc18bfb530ac9174583e7eb9f6c7ec30304350a31c12f42b4ddce17e9cf4758
SHA512524d931fcb6408d78cffab677a11e13534c80224d2ecb344916b391f71f7ab09d2b6191562539dbb9c79c19de93d1895d5a170d1e655df422acb6ffcc723e636
-
Filesize
1KB
MD5a4861baa206fbb391cdb7837d051ebb0
SHA1e3d44dca628ce76c9f1ed1e2411505ad0fb1fd9e
SHA2565876969b5f89646bcaa50d0a46b9bc2446f86acfda2aac585f1a02de30ffff16
SHA512ba45ad4ce3c3b0f0ebbcc428ea4546a5b47928964d4c5baff6c75a238697de49bad4d8d0520a6316cb2b307ea23f99c0de64ec1d4f5a29625e32f8154e96e0d9