Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 00:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe
-
Size
164KB
-
MD5
690a33abeec58325e4be45211d95d57b
-
SHA1
a0ed59492aebd944a2172c24a2d4e4a2ba2fb549
-
SHA256
574d40fbebebcac13860c459c710e0ec80187898837217a96b00637106e4c7f3
-
SHA512
e40bf9e76bb78cdd5da67de0a9a9150ab52cebeb92a12f6c7dca0d9067911a3dc5112c345b7d9d9a0ca23d12124dcd004dc260e8d510c90ebd34707b3259bb5e
-
SSDEEP
3072:xRUuxgAFtIN+3hXCg8FPiJ8SywdqBmLpbsdA5+u0jEUoYwwEP0f0YkFO:xRU0ggt4OBkqCSFqBkFx5+VEflOdk
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2868-8-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2868-7-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2708-16-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2988-83-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2708-190-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2708-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2868-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2868-7-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2708-16-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2988-82-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2988-83-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2708-190-0x0000000000400000-0x0000000000468000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2868 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 31 PID 2708 wrote to memory of 2868 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 31 PID 2708 wrote to memory of 2868 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 31 PID 2708 wrote to memory of 2868 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 31 PID 2708 wrote to memory of 2988 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 33 PID 2708 wrote to memory of 2988 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 33 PID 2708 wrote to memory of 2988 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 33 PID 2708 wrote to memory of 2988 2708 JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690a33abeec58325e4be45211d95d57b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690a33abeec58325e4be45211d95d57b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690a33abeec58325e4be45211d95d57b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58c8ff71234010eea4bae73df54a0efb7
SHA1852726ef945c2844c5e527e6e82bb95dfc63e140
SHA25642e3eba0aeb04eb3a538696bb09083196ed565b7460539b6cd2cbbfa7d3c120e
SHA512a66d4967f9801da948b3ce8d3043d9154a40f932b2244c31e1025ebc57e9e852695e9608d119a252dff74cdf6373982e1e7758ef8c6b233e5c44f85604bb25dd
-
Filesize
600B
MD56177a7fd5850a5987faf4c3c8755aa24
SHA1a74a75fb994ccd0e4c8fa3516a788aa876b93f6d
SHA256fe3514c2a48a3becd2a4edb940cefbd1b2fd4ebb8368e0dd9d3739cb551e425a
SHA51247e37695abd7289c437472db404e281752a1ada1e07a90dcdfd17cc78dab0ff1c52a12df420c342b6b22e5f35f4e293efa644da6553d7e3207faf781a6a8a385
-
Filesize
996B
MD5423ef50aedef8f35ec921031f1d11fbc
SHA1bc4142eeaa5536d7eecfb988529f3d88f190334b
SHA256b9237338f406116d64f5815bfbc2b9327f9c999179d4206f45e6efe75f2f3a02
SHA51282efe202aeb43e5ae4e19e3f3e5e2ecba33678b1627cb2f14ecd35b39c98d4b7a1d93f0979796ed1c1747be005a609c43af8f0771f5b4ff368dbe271b7d67504