Analysis
-
max time kernel
141s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 22:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe
-
Size
395KB
-
MD5
1a2f6dd211fd4fad1fe16ca7a411b84d
-
SHA1
46e0eb473de7b3e5af7667acfcc02fa6e1f267c1
-
SHA256
2c178f2a3ad5342c0bde45109d924e651bf38cb2adca4b0662107086009de52d
-
SHA512
c6e1ec0b66a6002741f45445e01c57c560c261bc77c63bdcf222a86587a840329c59ba1a1e37f98c48eeeeaf3f5d3f4c1a2e696932108528db083b93714e47b2
-
SSDEEP
6144:ik+KWzcEhDDcoSzq6tsWM7F75rzqd85rjx7ntYrNlEzjJihG6K3bNH:etIoWq6tsW6TrD5Hx2puPJihGBbNH
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2896-60-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/2880-65-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/3036-136-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/2880-138-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot behavioral1/memory/2880-249-0x0000000000400000-0x0000000000446000-memory.dmp family_cycbot -
Executes dropped EXE 5 IoCs
pid Process 2488 0c36ba10.exe 2944 7bf56dbc.exe 2880 bbf0de70.exe 2896 bbf0de70.exe 3036 bbf0de70.exe -
Loads dropped DLL 16 IoCs
pid Process 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2880 bbf0de70.exe 2880 bbf0de70.exe 1532 rundll32.exe 1532 rundll32.exe 1532 rundll32.exe 1532 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Equsuregada = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\KBUSerc.dll\",Startup" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" bbf0de70.exe -
resource yara_rule behavioral1/memory/2880-45-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2896-60-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2880-65-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/3036-136-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2880-138-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2880-249-0x0000000000400000-0x0000000000446000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bf56dbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbf0de70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2944 7bf56dbc.exe 2984 rundll32.exe 1532 rundll32.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 2488 0c36ba10.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2488 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 29 PID 2424 wrote to memory of 2488 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 29 PID 2424 wrote to memory of 2488 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 29 PID 2424 wrote to memory of 2488 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 29 PID 2424 wrote to memory of 2944 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 30 PID 2424 wrote to memory of 2944 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 30 PID 2424 wrote to memory of 2944 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 30 PID 2424 wrote to memory of 2944 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 30 PID 2424 wrote to memory of 2880 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 31 PID 2424 wrote to memory of 2880 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 31 PID 2424 wrote to memory of 2880 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 31 PID 2424 wrote to memory of 2880 2424 JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe 31 PID 2944 wrote to memory of 2984 2944 7bf56dbc.exe 32 PID 2944 wrote to memory of 2984 2944 7bf56dbc.exe 32 PID 2944 wrote to memory of 2984 2944 7bf56dbc.exe 32 PID 2944 wrote to memory of 2984 2944 7bf56dbc.exe 32 PID 2944 wrote to memory of 2984 2944 7bf56dbc.exe 32 PID 2944 wrote to memory of 2984 2944 7bf56dbc.exe 32 PID 2944 wrote to memory of 2984 2944 7bf56dbc.exe 32 PID 2880 wrote to memory of 2896 2880 bbf0de70.exe 33 PID 2880 wrote to memory of 2896 2880 bbf0de70.exe 33 PID 2880 wrote to memory of 2896 2880 bbf0de70.exe 33 PID 2880 wrote to memory of 2896 2880 bbf0de70.exe 33 PID 2880 wrote to memory of 3036 2880 bbf0de70.exe 35 PID 2880 wrote to memory of 3036 2880 bbf0de70.exe 35 PID 2880 wrote to memory of 3036 2880 bbf0de70.exe 35 PID 2880 wrote to memory of 3036 2880 bbf0de70.exe 35 PID 2984 wrote to memory of 1532 2984 rundll32.exe 36 PID 2984 wrote to memory of 1532 2984 rundll32.exe 36 PID 2984 wrote to memory of 1532 2984 rundll32.exe 36 PID 2984 wrote to memory of 1532 2984 rundll32.exe 36 PID 2984 wrote to memory of 1532 2984 rundll32.exe 36 PID 2984 wrote to memory of 1532 2984 rundll32.exe 36 PID 2984 wrote to memory of 1532 2984 rundll32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a2f6dd211fd4fad1fe16ca7a411b84d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\0c36ba10.exeC:\Users\Admin\AppData\Local\Temp\0c36ba10.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\7bf56dbc.exeC:\Users\Admin\AppData\Local\Temp\7bf56dbc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\KBUSerc.dll",Startup3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\KBUSerc.dll",iep4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bbf0de70.exeC:\Users\Admin\AppData\Local\Temp\bbf0de70.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\bbf0de70.exeC:\Users\Admin\AppData\Local\Temp\bbf0de70.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming3⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\bbf0de70.exeC:\Users\Admin\AppData\Local\Temp\bbf0de70.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp3⤵
- Executes dropped EXE
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD50206c3cf8bddfa9d599642fc43374f96
SHA153b1645bbc9be9c5666c54a7833c7c6e52b91cb4
SHA2569a79271ccb8ab86326d4f9cb019797508a27a3e0ebf6cd2b60bb25310e7b1de9
SHA512024e7d25412dd98dd9138ab433b66a45a2e1bb0fef5d572a91d52a2522a31c608bfdb0aac369d082b2eb4fd0d79057715bd3bc977f5fdc9862aed5fbd2a461d3
-
Filesize
1KB
MD5445ea8f812fa51da3ea61f1c8934f3db
SHA15e32aff445622a15aae38f84870cc27361604c60
SHA256cf8c802b552bcfe7712e85760175a0f06ebba9acf3e2ff50144d48bb992aa153
SHA5120588c800e2ead69a71573c2b8295db3416b47a21c054f5e7a3b63fd1261f41112d2b0833a76bc29f944e962552ec920707f28b570ec795992ef0439bd447e5be
-
Filesize
600B
MD542a29d5cf4a8fe6d86fb41dfd4464966
SHA1204149360f523b99c48482f16df034ba18c44679
SHA2569f0ab2ae7de7cd0547e066ed3fadd7e5c73c99ac4c37e9a8a30ae3e4683d52df
SHA5122e5584b0d853fc1f5687a2f17e793aacc0548f43e75c92b4a27c519c2a12243a124078a2290dd13dd2af61cfa72b599803a7537daef4bbd34b4ba784585c85e4
-
Filesize
120KB
MD53bd6790c828aca94e5a59e55ccf490aa
SHA11693860436086f31ba1ac307e445dd8febc550d7
SHA256628ef24a5390f5bdc267f0faf2b4c42a1c9eee39268db9eddcd934c0d121efb7
SHA512d99f77dd4759df623840b3752d7047da30887ce5a86f9cb415d5f2fec325f5c200e43e04b01256729728b6ca0729efc1479ea6b072621164adb26cbfbd7ecaeb
-
Filesize
52KB
MD53e6c0e0a790914e48584edad6b3665f7
SHA1c6172ab5d76ef86236cc6aec203ecc87fc85328f
SHA256007bd364ebe3b10abfeec0ec2615dff53dfd2d9994217e545b5dd1476b198cec
SHA512909b63e026b76335f5bd32b6caf62ec109e6e68810f56fd7e6abce824705f0a6df69797bbdebcb6360d15d1c8724ee4b09eca0c74a209e4deae9c5011c85b3cb
-
Filesize
120KB
MD550cac2ddd6a0d03ed75d63b996bf0798
SHA12429cae06a4362855e45311311e08537154181bf
SHA256f3cedf3f417bd1590a6615bb315e49003ec76b4400504d5175088d9adb7eacb8
SHA512b4844b7f9cdbc9496617ff6061357c477b698c1586684d76846112d5d715cf651e719221247f7916f245db60a23de3902783f5b052739773d303b1a7b649e399
-
Filesize
167KB
MD5a23a4cb686b3fce755ba7abf5e18a639
SHA1f4898ccb547ab75827624b911ba38f1e5bb67449
SHA256d667aa058a917018c2b10a58e1d52bbcfd43a9c8362d3ac4ec6ff480d7063c67
SHA512edb50a7a2e5cc2bbf5690c77a8aa1b4bcc6c6270e5351faf4203b023b5fa8e1d25fc7b0fb5f222eea804388a3675f7fff47e12c6c6baa3e302a4665402841f3c