Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 00:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe
-
Size
182KB
-
MD5
76a98fad0616b23e1e3778ad0996856c
-
SHA1
220d7c7a04ff044dc91b5987c525b76fd075d371
-
SHA256
0c8a14aac10761f9c283e4da4aef62dba8697880f8b7a8ce9f47e0db325cb9ef
-
SHA512
444850c009dcc22b2497f412e1da8769c11b0db31d7a95332e813222cff002aa96c96d93a5dbcad97e5a632fc33f7038ccd18d3d07352258999e4756d15c9111
-
SSDEEP
3072:9FBieHSOEbGyGb4gxhVS1z8Q3h5v5ZzcYH4jbJ4O13bddkXjjWF9FMt58r2:fFkGyIxh2z8Gl5Zzc9jbJ4ODKXnWGz
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1212-14-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2444-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1372-93-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2444-192-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2444-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1212-13-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1212-14-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2444-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1372-91-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1372-93-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2444-192-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1212 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 30 PID 2444 wrote to memory of 1212 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 30 PID 2444 wrote to memory of 1212 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 30 PID 2444 wrote to memory of 1212 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 30 PID 2444 wrote to memory of 1372 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 33 PID 2444 wrote to memory of 1372 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 33 PID 2444 wrote to memory of 1372 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 33 PID 2444 wrote to memory of 1372 2444 JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD563686d1a085d01fe4c7caf0ec537d222
SHA1abc13cb9ac1e4a6e5615151ee9b6cce239d69d23
SHA256e251202732c6a140903dec3232ea35415bcfcc3fac3e01bd667ed005b73b0b58
SHA512534ed77a89b50171f39fa495c5189b23a502c94bbd1345a66a66d9d5404663b241dfa6838a25d3570bb73683e37e2097bbd85d7eed6a305f15cbaa87a4135ad5
-
Filesize
600B
MD5cabf90d9155455d9c0c91aa513b3adf8
SHA14fa96c0966a49d7fc997042f35545854a23dfafa
SHA256a45e885a2877c0db51d03301eb8426c6b8acbae9c76f8da5d0df8f287d7cd847
SHA512c30999df4cc9a709eea9f7e94dde128d84b59da1cdc1621e3d36fc07d63b6f97814d0ffd52548c8132a175adfd0f0072ac38af54bb9c5903381be7d1662f8b0e
-
Filesize
996B
MD5340866b40bed151790ad16af80832947
SHA14ccfeb2d11567d1afe57ddacb4e7b7f2b67b41a7
SHA25664dcbe03d106c385fdf8bf2ece1b2235ed6c4bf45cc99b70aa9f99524a9b7bfa
SHA51252f2a405e7e89982c581f1964806ceae4c9502f1cb75e748083747687ebaa5b6670e791e0061c08028a2fe1a004977acbb0dc89f4a27f13d31c1e78da8ee1ec0