Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 12:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe
-
Size
183KB
-
MD5
64f9b94be51e2e97bbdb62d77c27355e
-
SHA1
28bf3b4e18bfecf3ca0f128e0237a4b0e2414b02
-
SHA256
ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590
-
SHA512
686c4823c7263180c4fc698f16f255ee7626cfeb4a8f365b43a6842cccd90203ed75b7884bda42d11f2dc9d7afcce47e94c5c3662c2acaae7286dc525a84c3eb
-
SSDEEP
3072:nFmbzWn7+CwH2aXwQNFWwqRaTW0MgxntUn3YuBL5xM68:FCmF9aA+qQkggoSLDMj
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2500-12-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2496-13-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2632-84-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2496-187-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2496-2-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2500-12-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2496-13-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2632-83-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2632-84-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2496-187-0x0000000000400000-0x0000000000471000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2500 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 31 PID 2496 wrote to memory of 2500 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 31 PID 2496 wrote to memory of 2500 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 31 PID 2496 wrote to memory of 2500 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 31 PID 2496 wrote to memory of 2632 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 33 PID 2496 wrote to memory of 2632 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 33 PID 2496 wrote to memory of 2632 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 33 PID 2496 wrote to memory of 2632 2496 JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f9b94be51e2e97bbdb62d77c27355e.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5f94b34c441b0b1f4abfe5b7fdbc45cfe
SHA11243a2e3b61a616e53ddb34f7d2e92e6e690d5a1
SHA256b2b917fe67974690b729fe133e6768e43ed1017ec8718155c2f5ebaf5bc12ffe
SHA5129790827b3aeaba8cbd01241974325bc2979eba90cdaedd4ff1af3837558141a624ceac67c8898c8704658232b620a168d37f5673047e9f51264fecf39644c265
-
Filesize
1KB
MD5bf0ca21971f3e2f70b514d5d1c3fc7cc
SHA1ffd072ced192c20ac8cdd13b05c5ae1d5289c9fa
SHA2564826e9d840ec24f17ae8242b6b6d287fc48aa8b04a4c1b75eab852b0408a2298
SHA5122c2490e5eb5dc06062052da056160626d99bdd7792b994bb4a511886401a4f5404083644d41bf02f54c9b5b503231c0c10580449301b7b03c67b442fa81d5c63
-
Filesize
996B
MD5277a87885253276c20e6e9532e8ca401
SHA13cc106f05d2ff2f05e9d6826200870e252065650
SHA256af89df410136aa12f81f6202296e93c2f54c679db6a02cee2ffb4f5c5575748e
SHA5126916e65d7b6a37cae742b22a4b110640040b762733e677c6a240d90cf53b3a26bf163364517104475a7fa573e42963fe03db1798548ce10ad88538247cbfc7ca