Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe
-
Size
185KB
-
MD5
fe037a6ff3d8edcde6b865f1b8a76cb8
-
SHA1
721d8689fce8145ee0e28a43ef8b20348f20a15b
-
SHA256
368445784f09b5b87ecfca40903054267d1fe48b25c65f36cbf77bbbbae9a6b2
-
SHA512
9521ade78df131b2cd26d9788b68514fa472913caa67ca68effff98426da39f86f655d779e00eb8f5559b099acb4bfb989b76c5845f80cdcf14a1704fb7cab66
-
SSDEEP
3072:58H1G9fgqDP6J8G8Wk1Cu24r4n02o0nOxQo+OJlTH2hLY4NWDI0gVlfK+B:iH0LG8Wu2trOj+uaLYVDIm
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1668-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2960-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2960-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2068-78-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2960-181-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2960-182-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2960-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1668-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1668-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2960-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2960-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2068-77-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2068-78-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2960-181-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2960-182-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1668 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 30 PID 2960 wrote to memory of 1668 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 30 PID 2960 wrote to memory of 1668 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 30 PID 2960 wrote to memory of 1668 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2068 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2068 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2068 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2068 2960 fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe startC:\Program Files (x86)\LP\7D69\21B.exe%C:\Program Files (x86)\LP\7D692⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fe037a6ff3d8edcde6b865f1b8a76cb8_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\96259\3B37D.exe%C:\Users\Admin\AppData\Roaming\962592⤵
- System Location Discovery: System Language Discovery
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD598784ffc702f633803283f3a33a2c5a5
SHA1564246043e18a4bc6fac4a3269798765233f1c54
SHA2564e06e3def9d81e5a1ab4e6562ae094f2cc9f4e7174e67254fcef3454db71612e
SHA512046ff80cd2f39e5363de23979ea36cde40e243da3dc36fa57505962053d6a3e4bd10e4baf78d6f305ac3cb9fb46abab1cb3ee7582ef8524292ebf68c4c99843a
-
Filesize
600B
MD5d1eb380ae0cd08bf84f0f8dc42938fe4
SHA133f7c91b30eea7e9625839aaca965a5a776e2367
SHA25622417d157b7f0b7983592f1df92ec0359ea6b3957782bcb5cd956ade324632ee
SHA5123b53c0c4bb0cdea00f585aaea1061dd1272868f29a821c64bb902b24cbba4ad2f3dea8a50dc78fb185886204438486b998682862bed9af67905d42eb4a3bf44f
-
Filesize
996B
MD562439232e999e398999facc7872d8826
SHA1293bd27a5b5244547197007996a5211ac8fc62a3
SHA25617bc9d15668bfacf9d96cbc807020a5c1cf8b2c0b8e81ae2490d7e84c56824ff
SHA51285a0c7b96c188bbfe84605f6213b9bc65b8d57657f0c99ff1530328eb658a6b67f2e52bf2d30c98444200f93aea6f5ca33e6fe3c746134c9647b5f08388cfb14