Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe
-
Size
183KB
-
MD5
fd0f495e2591d50d33149ef4521cf42c
-
SHA1
4c48efc91268be9226b42be113e3870e603f59a7
-
SHA256
8bf262dfef65d1d917608969c942062fbb0bcfa65c28c773c2dcdee479c33a82
-
SHA512
735b5449640451a0c8ee0a2dac914c43b4fc4c7bc72a9033f75a9e0d39b5f445b102a8569d59b15b9fae58429e0e173d4cb8dd2255c54901c35ff8f9b71c1d35
-
SSDEEP
3072:BzIIfglntYsALBO6tBONx+LMG/kh8rhg1rUyaYVk8r68i/kRylgEe2O0:uIUHAM+BsrKFwrVLOf/NQ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2560-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2228-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2228-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2300-76-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2228-177-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2228-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2560-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2560-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2228-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2228-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2300-76-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2228-177-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2560 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2560 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2560 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2560 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2300 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2300 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2300 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2300 2228 fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe startC:\Program Files (x86)\LP\24F9\9F7.exe%C:\Program Files (x86)\LP\24F92⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fd0f495e2591d50d33149ef4521cf42c_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\9EE44\93024.exe%C:\Users\Admin\AppData\Roaming\9EE442⤵
- System Location Discovery: System Language Discovery
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57cf5324a4dace3d8331b3e726066a1d2
SHA18d4de4dbd61934a6b535c619913b43bf1431fe35
SHA256ad6fba6eac0aef48a178fc1848ddaf04e48e1313c37d15208f8411a178430157
SHA512033c533786c7d646d1b7ae60d0f4317e187590f968af1378ceae2d84fddf38298c85eed5ff4bcfda71888431a1c76bea4c63321520bfa7ee45e0c4c94ca4c6c3
-
Filesize
600B
MD5d4e598edf390815df33c598dbe9999e0
SHA191b546a21977f24a55898a2edb88286f5ecf5d13
SHA25690c3121d60bde3b6c246c5e9cc24f59f442b93e546e77f1b8b23ddcd961d0890
SHA512a4a3037b2fe172636c8c8114f90996117546ad61d359fd73df0684d5f259428677406beb59035804939800df71879a78ec51b3f4981a3f18c212a12a9002f700
-
Filesize
996B
MD5bfad30a5bd15e69019fc365aee133942
SHA13be44072e0d7dfac743ccde4538fc64434338e39
SHA256f23b5f034befe92595696aa97b16fd8d49fde5f2d27eccac653e1608d17fe889
SHA512bd99fa44013cf622163ad298c863b109ff6246568d8416e7530fedf09949c0a62ce4e9ca33a141e3060caf1eec9d658403927fc6c00a85dd9a6aeb1c99c92652