Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 21:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_68732f9345efdf593a745212d567d526.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_68732f9345efdf593a745212d567d526.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_68732f9345efdf593a745212d567d526.exe
-
Size
166KB
-
MD5
68732f9345efdf593a745212d567d526
-
SHA1
ef06f9e1a835ee10b901dfa7709fc1ca16553800
-
SHA256
4ffa2714749a783ce2b5aaefdf26845b145a1631b2c0c027e8406e838a1cf5ab
-
SHA512
9769036dd81365d4b0bda27bdc7cb2a0024682089a2a96b1f2c1bcb72e0b1b7e86a76d2b8a20a8811be25fcd61771a66b17c7d9b570cfa9e502fc68538c8fc98
-
SSDEEP
3072:NKv0qrbcezlnFcv5VgT4+YPTSHXY/bufobOAKQTKxDJnHI/K/:NW0EjmGlYPTSHXerbbKFx
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2040-9-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/1732-14-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/1732-74-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/2312-78-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/1732-171-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_68732f9345efdf593a745212d567d526.exe -
resource yara_rule behavioral1/memory/1732-2-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2040-9-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1732-14-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1732-74-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2312-76-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2312-78-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1732-171-0x0000000000400000-0x0000000000446000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_68732f9345efdf593a745212d567d526.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2040 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 30 PID 1732 wrote to memory of 2040 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 30 PID 1732 wrote to memory of 2040 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 30 PID 1732 wrote to memory of 2040 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 30 PID 1732 wrote to memory of 2312 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 33 PID 1732 wrote to memory of 2312 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 33 PID 1732 wrote to memory of 2312 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 33 PID 1732 wrote to memory of 2312 1732 JaffaCakes118_68732f9345efdf593a745212d567d526.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53a838fc6e4074ecd2be28de43961cced
SHA19f02059c2d4026c1cfda7e37c73508d2509af0b8
SHA256174cbf2b4d8dc7999197c5a6cbc694e0c122365bd4ce855fa55c84e09b667fc9
SHA51236a87af0acbd3cd26044d45c50697859e516cb5d38c049da78fb8aee702ee3c17eb2874d424c9be4ba79a6e1d4583347cd9fa3e2a598c58e120e004018b333d0
-
Filesize
600B
MD5ecb7f67c03a49133245e3f8f4e561042
SHA1d73627d05cd5e898767d179c593709eb7534d5a4
SHA2564cc9a1eae65b8a60234cb65d605c2743d028841184bdc7d22b5b3cf9f16b014b
SHA512fdb331f09d1e84949ebece6213176387705632f1c6a862737993d3ceb95b4696e71dd1b8b998f33a4e6ebac5cb45b40f8bd733a111f673daa138be6b0864dee4
-
Filesize
996B
MD554d6dce6ebd903d9a7eebff2e148257e
SHA1f0a3742ca73f265e63af294362a223d5d086ea5c
SHA256c03c2928d48924935a8f00d0ff9681bb13177a98a6852d23159f2d48843bcd59
SHA5121eb30f581b7f3971fb7777a214af3cca1895beb3a8f1abf39076f717440652bf156845640bbde52d6bf2bcb32bd5487dd5f0b76b558b2dbb2b8a87633e41aa33