Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe
-
Size
178KB
-
MD5
e77b16918e4c32f4d8fdd1fce0a33b65
-
SHA1
9a5c501771ceb7219a9885a9890f48865603d2a4
-
SHA256
b2342931a413fadbc60bcd00d9add49bebbf147ab3bb305a80d8eb6169d549f4
-
SHA512
d11a6501bc583d74c7439a962b2f561e5103ba2f0f38e6edb88a16b7608cbbc356c050a57a33cbea0e7eb89539849d86f3b1bc111afc1ddcc27d9bf2a24f63dd
-
SSDEEP
3072:pajLOPuOHlI1DN/+VNJCZIkmI7CEJgDbovVbg+bDSd:wjiPupDN/YCWkVCDotU1d
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2620-8-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2620-9-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1832-10-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1832-11-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2700-74-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2700-76-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1832-178-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral1/memory/1832-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2620-8-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2620-9-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1832-10-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1832-11-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2700-74-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2700-76-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1832-178-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2620 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2620 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2620 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2620 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2700 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 32 PID 1832 wrote to memory of 2700 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 32 PID 1832 wrote to memory of 2700 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 32 PID 1832 wrote to memory of 2700 1832 e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe startC:\Program Files (x86)\LP\7216\00B.exe%C:\Program Files (x86)\LP\72162⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e77b16918e4c32f4d8fdd1fce0a33b65_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\69CF4\FEC72.exe%C:\Users\Admin\AppData\Roaming\69CF42⤵
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD55e81cc0ff46d102aea82956387875fce
SHA187013d56fcade01b13ed5ce67c106132992c8b7c
SHA25666c77cf1724921b3cc15ac39b404984894ede54652268bd2d34bc34d904ed260
SHA5128dc2e5f9511719f3251042883e260f3e704bfec8a9137a3d37a5a371d49ce0ef167f760d3bf56873937dd8af440ccc46b8d13623259262a2c1d0259d74227ef6
-
Filesize
1KB
MD5cc1ad45ebdbbc4f43ed121cf840baf67
SHA187c856061bb33c8de556f772061b8fedb112e4ff
SHA256dcbb905a26397411a8f46713cfd063661b5ce57c185c7367b77cba6497784374
SHA512584847136dbd133d72d8c1f5cfd4c4626886bdb4225fc62997fb8e99bfd3b3bb82498096f57962de199200cdb2fe3da68ac94e0a94d5b7b1bcce56babd83d471
-
Filesize
696B
MD5517b021e40d0717c815e30552679f54f
SHA12bbd11a7e5696dab5fde9732a349c5f54e606ed8
SHA25639ecd5c4bf9456c5f5262e5677d2db8344d84aab70576d639480694669a5fe00
SHA51248893b0eae08029c3a3063e1744a7176d6d2715c5530aeea796ae643f3ccead09f537afdb0b23585b8d1a56eecafe3f3cb453b2774448edcdc700204797312f1