Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe
-
Size
177KB
-
MD5
fe48f107cdaecb514a86ad6badde2007
-
SHA1
102a27278a8e20fd50d41870661bfca406f97e69
-
SHA256
b52a1df437c8536c3b7c0d78a5555c8311427693b8a1d3347aabdf50bb936810
-
SHA512
06b8df7cce0fc0edf10c6077575100ad18ced6640de9a2e4e14104c1583c67611ae2040bbebea46d9f9b8e4689acb51231ecab8bb4211d944152e47962bf9dcf
-
SSDEEP
3072:ZxL0ksG5gARjRaVo2Xm6IXIJAONZJPt6EL9nKqXuJr5ZeMgeGAKNxPm7l:xs0RYVo2QXIbJPtbgJVZeMgeGAK7m7l
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2296-8-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2052-15-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2244-81-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2052-167-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2052-208-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2052-2-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2296-6-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2296-8-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2052-15-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2244-79-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2244-81-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2052-167-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2052-208-0x0000000000400000-0x0000000000463000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2296 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2296 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2296 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2296 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2244 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2244 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2244 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2244 2052 fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fe48f107cdaecb514a86ad6badde2007_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577f17d38f37606966e23d77cdfdece9b
SHA176384fb0acbc76209282f4646e00812ba04c43f5
SHA256989329c858487af707b7cc1f7da36a63e4cd5cb6156cad45595cc17c13830da6
SHA5123e88982b2364594abc3381bae763aa7ffa0ab509fe527e919080d609451de560a0ec2d5c45b31d15089ae6c2dd0295f50aaee467c4cf4b124165391a336aa96d
-
Filesize
600B
MD5f0948ac22d1300ed7e785da119c57e10
SHA13b67329e32a185ada691d38dc0567936b898e573
SHA256f161052e725be7d4590618f2b362a6479d3000e58973af8d98911c6fe4feeae3
SHA512e7456d1a927ca71658a1e8f41e4060eb2cf95c0a33d9be06ff88dcc5fb7e3dd088112419d5ab245d3cc6565c0cf14986ca39ed8fbdff371ac055b0399df8c8b7
-
Filesize
996B
MD5e1f3096050877cb7167b82f27dc389b4
SHA11e36acd164e8e22a2301d74de1308b0163cae346
SHA25620f3bfeabbfb4d1ecd352d72cec62cf01ba0030e6ec2a5784e68fb1126fc96da
SHA51270b3623341b779c57379f5a9755f079ec83cb9a04c57600aa60f6bb02ec034784475b38f90347add5173aa2406359514c66791f15a8171890f13895d72907e78