Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe
-
Size
169KB
-
MD5
fb94b0a4ac7d7fff50a121024061222a
-
SHA1
be03b847836f1ca452bafaac0c872ef34eabbb80
-
SHA256
b6c63a936e101dc3784d42983eb6efe4f937ac735fbe5808898bf76334cdd290
-
SHA512
a3f443c8bd210229024bbce1b8cdacd42d26c7234d9ea1a210948b3b55e1aa21ad311744c9a438f5eda6e2a3924a0d0c42ddab78f723ff072352e43dd48df1b8
-
SSDEEP
3072:BbUL4+8zsVOIZ/rpMT66y0v8LNDZLuha5IUdrpjfWy9qK6PNWKvEoufZZn8X:Oy8lMtyW8LNlLuOIUTfWKqKuNrvEz+X
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2576-6-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2576-7-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2404-15-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2404-76-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/664-80-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2404-156-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2404-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2576-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2576-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2576-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2404-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2404-76-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/664-80-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/664-79-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2404-156-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2576 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2576 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2576 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2576 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 664 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 33 PID 2404 wrote to memory of 664 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 33 PID 2404 wrote to memory of 664 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 33 PID 2404 wrote to memory of 664 2404 fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD588dece809975103be73e0c6b9aa7c204
SHA19f5fc399e8fce399faf82e2b042789564d4421a8
SHA2565aacb1bc7f538d86fc0b131ebf7182b6daded8248b87da2f3c2921b419e3932c
SHA512e3cae219cc9dc8c0076d0367896ced2d6c6ff0aa1859d0e2a832061fc61af8c60fa175c12f9bb39177d770c13385627955465812a4d9014f57a9923aafd62cb9
-
Filesize
600B
MD565093f724f7e9c5eb834c484473c234f
SHA1e0635af339b403aa9e3af209a5add191a57ae384
SHA2565a8a6637af7ac0a15c655a1f168440de2f0d1fe92bc7b56aba82807060f2a67b
SHA51279db1bab44f0e5c2f3335ea8fc3bbf7a7713256feffa2945b9b1620de5b27e6d0d0c2c9e30e701bc679397006f84b9f2e015a6e1976339494f573ddb52e5583d
-
Filesize
996B
MD5f14dd959659f61592e89e3ac04bda3e3
SHA1aaaf59fcd970ae4f1391f73a87f26d6299ffa426
SHA2569275d0134be23a931ec2aa45ad70ca637ea94ffff905b9ac5acc6734a68a48bc
SHA5124c15b212ac6aee9886be17ede850ef984a2891f83e80dee1660db362bc96b981d8940399114aa557e7cf12c255535436d491548238d34c3c3bd4941eb514fd34