Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe
-
Size
174KB
-
MD5
fba9a2cc10862e1c11054af84427f403
-
SHA1
44ec7c5ae23ee951227317405ee56fc9318d29bb
-
SHA256
b959a44137466a19ed109945596d9becc38d2925fb63b4305c9d6b432d1903d8
-
SHA512
cf2cd3a9195986a231f228ebadeea5ddb6d08d7ffd0c24034e5d3944294b4ef9db0dc5841450dcd34216e201a13ba57753c3753dab8876e121d4c4470e881c26
-
SSDEEP
3072:1OuRxqAK87oRXr7qk5M29raOXCA/XtoG3o0nW/t0GGV2II/T:1XqAX7eXr7q2FaOXCaXaB1/82
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4948-13-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral2/memory/560-14-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral2/memory/560-71-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral2/memory/5112-73-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral2/memory/560-176-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/560-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4948-12-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4948-13-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/560-14-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/560-71-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5112-73-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/560-176-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 560 wrote to memory of 4948 560 fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe 84 PID 560 wrote to memory of 4948 560 fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe 84 PID 560 wrote to memory of 4948 560 fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe 84 PID 560 wrote to memory of 5112 560 fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe 90 PID 560 wrote to memory of 5112 560 fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe 90 PID 560 wrote to memory of 5112 560 fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:5112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cdc92e13c64b886bf83640941a0d944e
SHA15a9f84e65f2893209b24d53ae9282cb6dc57bcda
SHA2561ac6d6d15209513757614c9cab7b8e2117967d2acab978b364cde7e3b46c3f16
SHA512a3881eca3216f6b76ac99e066840e23031005f47cfec0d949fbd695a62258e5c8c87e5f7ee4cccc8e5eea0a2ce3bb89c966546cd4ec0cc3d351df43d8f5e1eff
-
Filesize
600B
MD567b83775e9e5d8efadb78c9ee1e02f71
SHA150631a26f64d5614dca6227afe44da1797f0e947
SHA256de4774e9b992103913fe40cfb500f53702d8358dabfb88103421473a1233f0e8
SHA512b6ce1923fa9c074c3acdc4563c1a636e750eeaaff38a886c38ac5547844c294be19092fed0e95d24d9d5ae38dc979ff9467ef91ce7d6b5381170d870c6444460
-
Filesize
996B
MD5432e1e042c8874e42cf7252c350ee274
SHA15ea0b9beb91327436a2c70f4f4d9eaa83d11469c
SHA256661990f86cc81dc4840505797502360acdaf924539a99fa286bf6594027b1f83
SHA512e5e2388d0a50f5f9e234c6ff01d81c1a2a2b4173186d838224299a1c68b7c33f3b4248d378c3550796df7a14a598ae8ce152e8c6a3bf7089df734894b5dabd86