Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 04:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe
-
Size
189KB
-
MD5
06677a3069694ad4c03eadadec47e73f
-
SHA1
542361f7fa71c178c460cf250ca7d5b78fab39ca
-
SHA256
6efd01f0da975719a5571e59b6aef98c2122c3c869f2953a64ba3346bd9f8e49
-
SHA512
158015ce139af9486e1a186b85c320000d7a5b9cd60772667f8544e1747307e78cf5461a1072c6d866a36a20b1b4e0524f6205f99223729555339b10cc79a70d
-
SSDEEP
3072:cS6p+c/8cBCwrQlxCoSs2o/olv4PK9Xj8+q5pWiwO749/HZPWp1kMtnTHyYADL:o+aaw3s8t4C9YpWiwO749PO1k0yD/
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1744-6-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2860-13-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2904-79-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2860-177-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2860-212-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2860-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1744-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1744-6-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2860-13-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2904-79-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2860-177-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2860-212-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1744 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 31 PID 2860 wrote to memory of 1744 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 31 PID 2860 wrote to memory of 1744 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 31 PID 2860 wrote to memory of 1744 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 31 PID 2860 wrote to memory of 2904 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 33 PID 2860 wrote to memory of 2904 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 33 PID 2860 wrote to memory of 2904 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 33 PID 2860 wrote to memory of 2904 2860 JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06677a3069694ad4c03eadadec47e73f.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57ccee89df5f452ab956a17e3320c6add
SHA1f6fa4e1a33720bdf8cc660a21b349fab2ac668d8
SHA256a27d8ea71428d63f4d53ba83681fc4b7b365b44f720e47e2692cf948630d7238
SHA5127f48d4bfed19f1003b3e9dd7fb4b604e13f1155d86dae8364c74b9586826707335de92b59b7e25e16a284b8a33ad31f6a96290007a22582ea9f3c480665e2fa7
-
Filesize
600B
MD5ed6e7fb944513b283b80bd7d7fd3d443
SHA13dc5e2ed736ca52de446e36b86d2b686071095d3
SHA25695b8c3e85cba25c473c955fb2565aeced80f4b88be14d0c80e54d166d117dd3e
SHA512292b76adf59a7eb57a2f125eaf0b3a287ccbef06db3e3e291171e28c3a3f0636b09615d12ee28e388cc9b71fa750987f47958d5ea99c4b493f20e07cd40408b7
-
Filesize
996B
MD523297f369eb7afcf2ca1da301b8d8f5d
SHA1088a060127184cd28fdfc6fa1c5d13c0704afa11
SHA256221dc4df7a472657adc2a494095041dda13a42aedcbe188bfffedd66223413f6
SHA51241a2b3fa0009e18862193e4d6a3103291c4957fcb6c2ae41681e3362c2c7f7ef23c3eba1f8f333c57e560fecaa8dedefa7f3f72883983f89f9bc8e3279e865ff