Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 11:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe
-
Size
192KB
-
MD5
7989142c320daaaff9b4ef00393f0c1d
-
SHA1
8c99d429c2c1d7190adc7c6ecd8184cb307f0b43
-
SHA256
8c7557664f097c9cdf55ee281f71a17b69204d56fcb0592b82f74340ffe03f6a
-
SHA512
dd6de3c524e6b78554e46d96ae88db9da855bc13f932d0c64817204cb17a6290c9f2cc2c2ee5be70c11fc6c57ddc4a75414a1051f05d0f485ddda0888aec826c
-
SSDEEP
3072:o7uHYiIzubg6s2ed48K5vEUnsWYkFq6pQxKx0V5r3oqdNWO7OI3anb/u9n5Z1Mhh:omYsbBK48Y8MYv6p+b3HWIULubXM
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1956-8-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1956-10-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2332-15-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2296-83-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2332-190-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2332-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1956-8-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1956-10-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2332-15-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2296-82-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2296-83-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2332-190-0x0000000000400000-0x0000000000469000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1956 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 30 PID 2332 wrote to memory of 1956 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 30 PID 2332 wrote to memory of 1956 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 30 PID 2332 wrote to memory of 1956 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 30 PID 2332 wrote to memory of 2296 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 33 PID 2332 wrote to memory of 2296 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 33 PID 2332 wrote to memory of 2296 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 33 PID 2332 wrote to memory of 2296 2332 JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c03eb515c2ac25ae569e3ab0ae19b4a1
SHA1953ab2ed466d4936acb6e0a378c14a39e35798cc
SHA256c07fd4366c6cf99e775c2fc8ada5e8b97cac9c5755b690120f87f1d75e40f593
SHA5120eb9149ea402c1a1a04ca043d77e30d5a521e7e2577817147ce5da4f3eed6e0c4a36984123c9d5a54f87970d66f5fb4cb6a9d880060fcd49f2e542966e24b2d3
-
Filesize
600B
MD5287351c2a52bbe792d85f3d5f4d5ef13
SHA1534a17a246e62058d39275f1b7028f32aec67ad9
SHA256cd9179674b7978b49a8e9c94bb9320116ae55224600221b09c4dac37ad220403
SHA5128546eae80e71d4955ea428e758e107d0522efe8d970263361a88627bb2bdf6efe99e1b58a5b3c3e6404cddeee524cc630c918eba85064afc08b794998d586e09
-
Filesize
996B
MD52fef410818e49de4582c955529ba9c08
SHA14d5cc94c73deeda469bd1dd397fc77be965c4963
SHA25638ce01f83b476081a6eaf4c70fb719458159abfef0c7313051dcb7e55a06f1e3
SHA51286224b7e44bdee4d046d612da65a3c653e3dd8f691bcff88588d8cdbbf6f6bbeda214038dfd71cefa57070d59e52d206d1ac73f3c6553280508ec0b997e0af49