Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 23:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe
-
Size
181KB
-
MD5
1b21178c2bfba9d0f395dd5f1b97295b
-
SHA1
06a1539a431de65838f2e1b319244f8a578b90e8
-
SHA256
13acb4e62294b06f8c273e0c3bb9728fde6069e4e6b5e0e709ba68673bccbedb
-
SHA512
7ee145e9b8b5a978eb22ba76b1ee1cde2b80ad8ab5f120732dea474732a7c914e1433e17ccbdbe1330d01db7e07d42ff1aa9e41a77cb9898eb9713666f0c21a0
-
SSDEEP
3072:/RoXYWYwC2Dkur+gvyjV0mff9SpAEYaUFucx2vQcCMHML26HK0Qn4aYjL1axNQ8D:wY5YkurPmVbnqqaU4vQcCMsenBYfer5l
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2536-12-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot behavioral1/memory/1728-13-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot behavioral1/memory/3056-74-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot behavioral1/memory/1728-183-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1728-2-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2536-12-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1728-13-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/3056-74-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1728-183-0x0000000000400000-0x0000000000450000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2536 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 30 PID 1728 wrote to memory of 2536 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 30 PID 1728 wrote to memory of 2536 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 30 PID 1728 wrote to memory of 2536 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 30 PID 1728 wrote to memory of 3056 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 32 PID 1728 wrote to memory of 3056 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 32 PID 1728 wrote to memory of 3056 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 32 PID 1728 wrote to memory of 3056 1728 JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b21178c2bfba9d0f395dd5f1b97295b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5cd07fe1c17ff11a535e7236e0c3b9206
SHA146f863c1d21c5ea0ffd1ab5bf8338087cd420ba7
SHA2566d70253798dbaace031b1da69c5be25538123ee5a05f28e55b952b4320b1c8af
SHA512a353226f7a9dfe4c8e4f3d00a098482b56a4d6c6779f7d34afcaade50b622eacd97917be278b8326c9dacded629f7708dfaccca01a2ea072e8a7cc834622a8a6
-
Filesize
1KB
MD5aa2830e6fcdd09b6a492157e72b9854d
SHA14bddce682314696071edcfc1a2553c9417b8f3d8
SHA256e7c81571feb50aa2d7843af61f8672d7c027a51a9c54d6230294ddf96721dea7
SHA512b844750d62c99d9bff616f904aba32a4586e21eba72f5bebaf92ac0df7e436f84ac5c151dd70ffbfee84aba89c407860582594fdb3d25268d9392847d1c3378a
-
Filesize
996B
MD5e03d06b06aaa9045d49e795142d94d4f
SHA17fbfb13c67e7e4bcb396629ebb78168ac4a79150
SHA256c82e0c718090e256098bd6ba8ba06f9bff7fae26644ec75e0fd03996dfb61e35
SHA512d377980c7704c7670a8e8bd6b12ef7d38b5fb6a13166b5b6d01aded4cb50055dfd0480f018e8c7dae701593e90e36af5d2658757550035c4c83d6c1d7708ec26