Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 21:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe
-
Size
158KB
-
MD5
2f9dcfeb1d09751cd1bafb19d06af006
-
SHA1
a679811876f5eb769adb5fdd16c9b720feb5501d
-
SHA256
64b0f66a09abcc79957de90cba95e3954dce9d0f9ba0503283a7b83bb992b879
-
SHA512
f5b802326559bd26340425c885e8377453b41208b4286d37946e9b1729f6627320eabb6d647ab6df584e75acd86d0add3826e5c9b0590f88d564bcb47d46d378
-
SSDEEP
3072:y1FxSngp/Zew82am8LTHdRKNSAAE0fivqFrkxrmWirHZC89n6vaL:ID/Z71ATKvOkFmzHfia
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2548-6-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1576-14-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/852-82-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1576-149-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1576-186-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe -
resource yara_rule behavioral1/memory/1576-1-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2548-5-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2548-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1576-14-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/852-82-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1576-149-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1576-186-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2548 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 30 PID 1576 wrote to memory of 2548 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 30 PID 1576 wrote to memory of 2548 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 30 PID 1576 wrote to memory of 2548 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 30 PID 1576 wrote to memory of 852 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 33 PID 1576 wrote to memory of 852 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 33 PID 1576 wrote to memory of 852 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 33 PID 1576 wrote to memory of 852 1576 JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f9dcfeb1d09751cd1bafb19d06af006.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55fbdcd45593e1e5adc494f12b7ad87fa
SHA1ffa5a4d3f22247907b2e01f1d0c6bedf6a732cc2
SHA2568d65014aec0f667d37f560c716cdbe0449c56f7fc3650693fbaa03ef9435b401
SHA5124b6cdb2ae4bdcfaae0b5c99b61f1083f0183fe4459346aa62aac47f9dbefd9c57c1f6874216484f7b5230994f02fe487cb5d08d64e9b26227468cca423848211
-
Filesize
600B
MD5fb11f3f60d65622d81248da10380cf82
SHA10f0a3f9ee59e80058fe2fad6152303dc428851b3
SHA256d0086ee61024f302ed4cc9b552ba8be84f339c936e2912fbc1137d206eefcc5d
SHA51291e6000c4f3cf2f0b31b9760f8d52d4d0be626d5e5011cde575ccfd27ce178fcf272766e1a9aa9607fe565debdcac4ef68d5b7d17179119f17e7014a2ff2a75a
-
Filesize
996B
MD59f8abfc3747902560cec132838730f66
SHA12c980c3888f49ec94b113cbc04a83a472897b56a
SHA256fe60ae77d0187968c9ba5ede9bc92aa37e24ce613cfbeca66a8d84126a063fe5
SHA5120eed0d33ece4cba06f44f22c5de242ffd71eea1a0113f8627d0ffb9705b5acd78decadd41d18d42551e69ec2d5c02ddd4faf7ad18fb22f62599b29724c536825