Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe
-
Size
191KB
-
MD5
d2e1b84666f8d3601b3cac019065331d
-
SHA1
68c10f67795643a830b99573dd8f15ffa4c61867
-
SHA256
f8cc35b3a05ef14f0d29cbb6dec90967c0f94481c6dee2a888b407ffa34599fc
-
SHA512
8e697fddbd64e2bbb79c95bcc7da57c4aab9869c203e66fea365dd0e3a9d6d52b10a974078ef097d54a04e504c4a1513f4ffa9eedf481f690bcfc02190197c3a
-
SSDEEP
3072:aPrcNY+evWLp/is9W6kxl9NnBne6ItAKz1XDN3tGcjeGShKuBaGirak5LXzgQzsT:aANTevO3WHdHIeKz1TN3njeG7ak5Dzlf
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/316-13-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/740-14-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/1636-81-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/740-201-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/740-1-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/740-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/316-13-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/740-14-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/1636-80-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/1636-81-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/740-201-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 740 wrote to memory of 316 740 d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe 85 PID 740 wrote to memory of 316 740 d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe 85 PID 740 wrote to memory of 316 740 d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe 85 PID 740 wrote to memory of 1636 740 d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe 89 PID 740 wrote to memory of 1636 740 d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe 89 PID 740 wrote to memory of 1636 740 d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d2e1b84666f8d3601b3cac019065331d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5905a4ebb1cdf8f4f31bc339adab17bc1
SHA10783576dd85022ea045cc96fcf60618d4cb93694
SHA256d9b4ec44f2a855431c61212f775e47dac7a5f61a271485012050e31b8f055d16
SHA512950dea25533e133b23790ce098827deb7f5b77c6687f5e7fac2a81e39f210e7c5c9b1db331cd14ebec3df43c16fdca2cf723d3e548e55f1e2513e639f348f931
-
Filesize
1KB
MD5da4365f663eddbf4d067860a8a0dcb5b
SHA12bc4498dae273e71ed608528fa232e14abdb181e
SHA256589ec7eca74314bd6ceaccaad79416984ce02b9d23dabc64127f2d3b4e79a89d
SHA5122ad36cde310d5edd91fb39f432948b60d6c1783ad56e4b7d8b41fdefec26a4a6e705260829c1bb76bfdbfbb3ecc37494d828cf80837750e1fbb9dd703b9ed4f6
-
Filesize
600B
MD548caa037228407d767005cc882b8c07f
SHA1ad1ed3062fa55818f4f47024e7f8e07841a0be68
SHA25688218bf032b6a241bcff5aba1c35a3505e4e95d83eba2b423c29e17a5e5ccff5
SHA5123b76821b911f7afb7cc3d22cb887c001b610b65bcaa5671ae0b07f1a0104e493e676028655b2931c8d28885114ee4290dab4e2585d5bdfacd08ce56a507d1f5d
-
Filesize
996B
MD52f019fd216e13b1b68271abcc0b35319
SHA119d526320a13dd201c6f25884f87cdcd13ab2dc3
SHA2560332438cab21f906886ea5c9421f696bd162629078cdfb14ce07bf1a294e4437
SHA512cf152c22297f99da36c36aaf2057d4b37074d0f7fc56e7c1a928e68dd8f6fcceaedc29a3145e79046dbd578acd6f23a69eedd9d82c7affa71e2748c80d79ed72