Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 18:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe
-
Size
172KB
-
MD5
7b198772f7537b85497ecb23545ba2ce
-
SHA1
9266c8e880ff247b4a0260019328c8ffd3ac05f6
-
SHA256
063c81d12968d51e53c675030ebd49ec5f9283e52049460a22e5cfd7c7f82cec
-
SHA512
a1c43f1793171c875b1f5a1df3173da8ab1af87f14751cecbca0c21a41849f1a805d4be24c2a6b5dbbeb6ae5d667e491bdf67bfed182b919c120535068bb3f25
-
SSDEEP
3072:eF3WWl4UBXhn3GPl1SNEUoJ5HIKAsnWqREKUE1GKCA1L:bW6+x3ol0EUeHzrWhKZAKN
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2456-13-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2456-15-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2868-16-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1200-86-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2868-168-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2868-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2456-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2456-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2868-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1200-85-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1200-86-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2868-168-0x0000000000400000-0x000000000046B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2456 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 31 PID 2868 wrote to memory of 2456 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 31 PID 2868 wrote to memory of 2456 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 31 PID 2868 wrote to memory of 2456 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 31 PID 2868 wrote to memory of 1200 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 33 PID 2868 wrote to memory of 1200 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 33 PID 2868 wrote to memory of 1200 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 33 PID 2868 wrote to memory of 1200 2868 JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b198772f7537b85497ecb23545ba2ce.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59618c8a9326019e60b7aa897934f32e3
SHA18686effed1a11512874cc45d9493ab8b7b4c5f0d
SHA25631fbdcca3e0078384daf54f70ff4792053bb6f868f91c38f929d88a5b716b654
SHA5124ab072b48e797e4f48d0b9c7887669af6c239e8dccc807f968fa4931b0c82bbec376028b91db3f893b2eb51cff1388e0f99f380cdcfba71b9240920c87902be6
-
Filesize
600B
MD5d036ce9dd1f680db84eb870037b985fc
SHA1501f866baacf3e900e6ff2267f122c13a0ee252c
SHA25641233d5bb6830c78c5a8af759aed745427d3276d0fe9ca0632e67a26264dcd8f
SHA5128e9d7fc83ac94261227104540d7d2f2d2f9c7be30f81000ee29112a2dd5623638f484e43b51ed40f4e68354d015e14351e38744030e7480498a3b305bdaf7f10
-
Filesize
996B
MD5b458b37467b4f47fbd845f68a01b43b8
SHA158b20e28c5edaeccec82ba7d3e36667ca73d8060
SHA256dafd236fb0b12a54480b9979a981daa04e480c926fe01585ac5978f92788fd0d
SHA512a784f6e3932e49b7a5f272eff6bc55c4f8d768a68e8fad81a39abb7aff7635f2753227248e701679042ba3411b84fe420a4fa232762bee56a2e4186bb04a197b