Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 07:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe
-
Size
179KB
-
MD5
0953ea55cbde8a4348fe587a94494dc1
-
SHA1
9661d5e1c0309cc1ef9f5eddea8e503e26aed612
-
SHA256
2b2a13b06aa43334f963ea9fb176be6e62a07bfbe9873bfdc4ea7e1a68ad1f54
-
SHA512
13d114b9cae405878c4e20080aeca6de1041765d51b528128e98aa6d23830137b98f77252a7836a38339dc73147879159810f5ac09e1bd7a8bf9e32d351cd1e8
-
SSDEEP
3072:EaAZQ6101RAkEeVAnjHt/7kXksrSe4pyk4wTaHaVDnV2SzHXCZNubqs5:EaA66L5kXkw74D7yZ8bq
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2788-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2248-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2248-16-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2396-124-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2248-299-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2248-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2788-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2788-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2248-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2248-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2396-123-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2396-124-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2248-299-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2788 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 31 PID 2248 wrote to memory of 2788 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 31 PID 2248 wrote to memory of 2788 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 31 PID 2248 wrote to memory of 2788 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 31 PID 2248 wrote to memory of 2396 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 33 PID 2248 wrote to memory of 2396 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 33 PID 2248 wrote to memory of 2396 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 33 PID 2248 wrote to memory of 2396 2248 JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe startC:\Program Files (x86)\LP\F154\350.exe%C:\Program Files (x86)\LP\F1542⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0953ea55cbde8a4348fe587a94494dc1.exe startC:\Users\Admin\AppData\Roaming\4D335\17FF1.exe%C:\Users\Admin\AppData\Roaming\4D3352⤵PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5d17229984093dc660346039b400e7cc0
SHA1886eec1fd4e9c7b6697fd35b3c0f4019ffb0ddf5
SHA2567ba06f48c14f6bb671dc493ebeb7946f9763f3c8046473a630ab2e07d2a0985a
SHA5126b770d4fe799f394022798f3660285b8bc29282180842565b0ad6dd97b0a44eeca97f2f22795892805b772e28f9bd03ee0fbddee0a84e582860992b918623e95
-
Filesize
600B
MD5b99f03fc61e178409e66996fbdecd415
SHA1b584359e3ebf1d76eb517b47bcd3c8915865b4ea
SHA256d8fdc47b495cc9666b0ecbd67ed99845531766ddd4c715727a50cf52458617f7
SHA512234907756049524493f599aebc0862e25bf6aaa5d3db08fa26208b3b29c1a93c3935ed001e9f45bc76d8e003bdd6f3c79d58d79f8d123692a422fdc07e693d10
-
Filesize
1KB
MD529896be4688815080269a56a2f23a30c
SHA1e7a9f8899c2c800a4218ef89e8b2e7da2dce413a
SHA25631a3e801b30fd5fe0432ef0a86499bee0879a8778bcc07a7dc35f357390f1ac9
SHA51287f92190cf6e78a3c38bdaab93b1205fd3ee7286c4454d66c51460f0e3c364b3646f5545e23d43fff675d5da369583dccdbe1bf736bdd6c986f8e6850bbc19c8