Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe
-
Size
164KB
-
MD5
fe325bdf1d13ab91b307c6c77e9a8f5d
-
SHA1
35461dee62ac27823f4e5a16d4f9ddaea7fd4f1d
-
SHA256
d7c1094ec76efcfc64458d50bbafa066414684c144afbaf15c755375abbb46bf
-
SHA512
1d81c8a89e91355125bc21c273fc43bb56f15a09e14cf62686864ee5c1928ce7ba016a29ed19013a9bcd2ffd41ad14084d914b6bb1514cb7127086da559d2af1
-
SSDEEP
3072:Om7WiBfRXptiSo/dMLjm5UstDczLMD7nbWfJJg95aiMa:Om7xBZZ0S2dMLi5UstczLc7n6o9Qz
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2472-6-0x0000000000400000-0x000000000043D000-memory.dmp family_cycbot behavioral1/memory/276-13-0x0000000000400000-0x000000000043D000-memory.dmp family_cycbot behavioral1/memory/1460-78-0x0000000000400000-0x000000000043D000-memory.dmp family_cycbot behavioral1/memory/276-134-0x0000000000400000-0x000000000043D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/276-1-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2472-6-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/276-13-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1460-78-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/276-134-0x0000000000400000-0x000000000043D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 276 wrote to memory of 2472 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 31 PID 276 wrote to memory of 2472 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 31 PID 276 wrote to memory of 2472 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 31 PID 276 wrote to memory of 2472 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 31 PID 276 wrote to memory of 1460 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 33 PID 276 wrote to memory of 1460 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 33 PID 276 wrote to memory of 1460 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 33 PID 276 wrote to memory of 1460 276 fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fe325bdf1d13ab91b307c6c77e9a8f5d_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5cbfd405bf26f34a285852b7d3dce7e60
SHA109a6840e16abe5c8295a3bb7660b1ec723b6c3c9
SHA256660afe0d683c8a353e3ec3c73a8f35b3229735449dff2bce49b309dfeb6b9910
SHA512812b75f23b401d0cc2fbba8238597ecac50907d4f916659b1ca197f4441365af8ac5a5a67ada44dd6ac998094c78390b9c4d91c454e3b78640ce7f8503b3bb29
-
Filesize
996B
MD5557412407f03bc77c89a8caa2a3db819
SHA13b27e7079feaf4fa8eb3bac47408cbf419106665
SHA2567e29e0406265e0b6be5f0a1671dd325749b4f4dd928253f4d8807db98cd4e89d
SHA5124f0f59107d18ba6c3e506134e3c6e5875f7950084a4879af18ff0507195150936f7332391ed279d226afbc1f6fb1cace9cfa05c9baabe8d694f751de5b3c2eca