Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe
-
Size
186KB
-
MD5
97d8416ee6747bd5ec38ae0898f6ff28
-
SHA1
4f4805ce6ce7510a02bc63731868a20e6f588739
-
SHA256
ffa1e4c116708149bab021997e1485dc700ff0289f3f1bf89e62a4e07320daf5
-
SHA512
12d35b8e277f2bf2ba53deedfb4beabbbc3674426b2256cdfedeac580fdd2d99731834ab1c813ea49d898d37d34369ca83ea7b974e7d200ac5b9b40a40119b8d
-
SSDEEP
3072:sHR73HHWa7wZQChd2U6vXxjUzx+kE8DcSR5RMDU8O82UxlgJLLZggdi:sHl3MQCVx+kE8ASRLMDR2Ux8fZgsi
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4912-11-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/4080-16-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/3684-84-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/4080-197-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4080-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4912-9-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4912-11-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4080-16-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/3684-83-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/3684-84-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4080-197-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4912 4080 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe 82 PID 4080 wrote to memory of 4912 4080 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe 82 PID 4080 wrote to memory of 4912 4080 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe 82 PID 4080 wrote to memory of 3684 4080 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe 90 PID 4080 wrote to memory of 3684 4080 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe 90 PID 4080 wrote to memory of 3684 4080 97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\97d8416ee6747bd5ec38ae0898f6ff28_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:3684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558c0e2e0e866aa793a16697b194252ef
SHA170b894b4847286d8cfeaa3f9f388f9e03e9ed349
SHA256807d54193bbf20f19c3fb25d3171c21b86d97644caa851d82977cd361521b67e
SHA5127935bcfe099011634eacaf372cf01cac73141fe89d7d46ecdb16d1f3c4112669af0a2b7bcf7375832f43a56cb89c0c202cdf279d90ef34bf2871a822922be36f
-
Filesize
600B
MD5c78751d196a49aa870aca7be0221897c
SHA1ca496c072fe64872b4b4ae87e0056e9599ce1df7
SHA2565a2ae12319cf703c27fc0976519a568082a30962ee34ba323c3d8d8bbd7e070e
SHA512083d93e7346b246139ef939e33f656485326bd70d7b0a31bc46da5cb075725946f22f7e8d82431435ca396789ae56fe7c5f3f8ac59f3dc4f5103bf0834731d8d
-
Filesize
996B
MD5522241c31ccf0508840983a410ccf3cd
SHA1acf87c2e75aabfca38df3fe408ce029350c6f172
SHA256b57e3fd90d7b270785a57080c69c505b162da9018e8d6f1e88f15cb6176a8ea5
SHA5126d5ac8a7abbf75facd18ec0c66221e8da50412e11710eab22fc4db0fe1175c81617e27898da0a564c3aacf8f84a0efdd9c2c0770b8dc5569820e8cb7a3687e9a