Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe
-
Size
168KB
-
MD5
fbdd103ae86d23f7e3f4d993d4a570cc
-
SHA1
f8f7231787d46581876460247f6a17fd7c54062b
-
SHA256
dd41d88fbde6ca80a88dd8d25ad258d962e239d585772fec6d1f4988349e1aa3
-
SHA512
cf96502eb2ebdfe72f7fd27a29b349e78a1d80e120a4d336dc95d5d9d711a8405dbbbb0d6ab73a753ff20d516a460b13470a58f50aeb9a06d1e797f604f2ed2b
-
SSDEEP
3072:Y95qQ/o5bLwW38yiOMqVba3ocoz0y3u9oOq1Pvf1ubAgPnv7oFIpHf7n:Y95qQgbd8EMqg3EzFu9E1Pvf1yPnjbNb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1648-7-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1668-15-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1668-76-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2228-82-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1668-192-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1668-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1648-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1648-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1668-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1648-77-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1668-76-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2228-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2228-81-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1668-192-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1648 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1648 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1648 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1648 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2228 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 33 PID 1668 wrote to memory of 2228 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 33 PID 1668 wrote to memory of 2228 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 33 PID 1668 wrote to memory of 2228 1668 fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fbdd103ae86d23f7e3f4d993d4a570cc_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5448358e692d8d7fcdc9d0946317f5a03
SHA13571608a4cd2933fadac0815a6a948c3588b02fd
SHA256ab72439e54dedba19bbbbcca6f90f8c1626a6b5978003cccb01f69f4a3bcc644
SHA5120536e70cf8bbb5f0c5093f943baea86f72c63405949c987f38e902cc95e94d09bb190215ad0efb0a95393ef1b33d7ce4885972399180b86bbd29f995fedf7f43
-
Filesize
600B
MD5b13ce5f62b09aa00035812ba95232863
SHA1ca9105753847bcfb35a93514238b91f80ec5a720
SHA25656811221469fb4474bed9848f23ca2ee4ca214647cdb523f437fe52b469ecbb8
SHA512effb77b2dba81373b286937e765ecb0c930364d52d5aad8816697efe11abffab9216429cef3ea0040517ba964f187140a102418530dedacfb5dcba22f032edc2
-
Filesize
996B
MD5cbc468ee401130fe0125bae51ac74119
SHA1b8573000a393356ab99292662154fe6d25f302fc
SHA256fff5bc2efcc3b1c38fef5082b1afa1fd576472d9f1998be7bbd2c5d158b956df
SHA5123af2d7680fae520d2637c95950f62e1c31faaac3bad6cbfb4a41c7e9cfb70368f3f34301b9f01226c80efdd4a5819fea1495a86dd1ab7472cee1159f506f3f1d