Overview
overview
10Static
static
3JaffaCakes...75.exe
windows7-x64
10JaffaCakes...75.exe
windows10-2004-x64
3JaffaCakes...75.exe
android-9-x86
JaffaCakes...75.exe
android-10-x64
JaffaCakes...75.exe
android-11-x64
JaffaCakes...75.exe
macos-10.15-amd64
JaffaCakes...75.exe
ubuntu-18.04-amd64
JaffaCakes...75.exe
debian-9-armhf
JaffaCakes...75.exe
debian-9-mips
JaffaCakes...75.exe
debian-9-mipsel
Analysis
-
max time kernel
890s -
max time network
841s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 08:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral8
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe
-
Size
174KB
-
MD5
09f0b3a451ae967a9f7001f333e61775
-
SHA1
72ad8b7f2d1d3abb2e8d27c7614eabaeadae5779
-
SHA256
1d9011525891ae7b3d4d93fefece72e4db3d472dd479d95a896f04a355faeff3
-
SHA512
b450fe590695097944944a46e2d11bebbcd4404b827205b8e7bdb0107d3fd9b7570de83205975d56491559a4883d63446947a522e0bcf383b954a122e4ddcaf4
-
SSDEEP
3072:fW0ZO/QFNGawwTXMdqC/XdV1fqc1MxfGZnC4FABexVQZ1s9/cbU:fW0ZpFE9UXKDLi+NCsViu9/u
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 13 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2480-15-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1252-16-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1252-83-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2504-88-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1252-189-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2944-202-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2852-206-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1252-325-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1252-398-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2268-413-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1412-481-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/308-566-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2884-572-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1252-2-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2480-12-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2480-14-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2480-15-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1252-16-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1252-83-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2504-87-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2504-88-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1252-189-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2944-200-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2944-202-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2852-206-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1252-325-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1252-398-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2268-413-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1412-481-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/308-566-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2884-572-0x0000000000400000-0x000000000048D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 492 msiexec.exe Token: SeTakeOwnershipPrivilege 492 msiexec.exe Token: SeSecurityPrivilege 492 msiexec.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2480 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 30 PID 1252 wrote to memory of 2480 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 30 PID 1252 wrote to memory of 2480 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 30 PID 1252 wrote to memory of 2480 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 30 PID 1252 wrote to memory of 2504 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 32 PID 1252 wrote to memory of 2504 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 32 PID 1252 wrote to memory of 2504 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 32 PID 1252 wrote to memory of 2504 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 32 PID 1252 wrote to memory of 2944 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 34 PID 1252 wrote to memory of 2944 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 34 PID 1252 wrote to memory of 2944 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 34 PID 1252 wrote to memory of 2944 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 34 PID 1252 wrote to memory of 2852 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 35 PID 1252 wrote to memory of 2852 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 35 PID 1252 wrote to memory of 2852 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 35 PID 1252 wrote to memory of 2852 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 35 PID 1252 wrote to memory of 2268 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 38 PID 1252 wrote to memory of 2268 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 38 PID 1252 wrote to memory of 2268 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 38 PID 1252 wrote to memory of 2268 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 38 PID 1252 wrote to memory of 1412 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 39 PID 1252 wrote to memory of 1412 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 39 PID 1252 wrote to memory of 1412 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 39 PID 1252 wrote to memory of 1412 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 39 PID 1252 wrote to memory of 308 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 40 PID 1252 wrote to memory of 308 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 40 PID 1252 wrote to memory of 308 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 40 PID 1252 wrote to memory of 308 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 40 PID 1252 wrote to memory of 2884 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 41 PID 1252 wrote to memory of 2884 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 41 PID 1252 wrote to memory of 2884 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 41 PID 1252 wrote to memory of 2884 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 41 PID 1252 wrote to memory of 2304 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 42 PID 1252 wrote to memory of 2304 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 42 PID 1252 wrote to memory of 2304 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 42 PID 1252 wrote to memory of 2304 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 42 PID 1252 wrote to memory of 1196 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 43 PID 1252 wrote to memory of 1196 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 43 PID 1252 wrote to memory of 1196 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 43 PID 1252 wrote to memory of 1196 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 43 PID 1252 wrote to memory of 476 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 44 PID 1252 wrote to memory of 476 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 44 PID 1252 wrote to memory of 476 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 44 PID 1252 wrote to memory of 476 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 44 PID 1252 wrote to memory of 2924 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 45 PID 1252 wrote to memory of 2924 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 45 PID 1252 wrote to memory of 2924 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 45 PID 1252 wrote to memory of 2924 1252 JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe cmd /c %TERMINATE% "DELETE"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1412
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:308
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:476
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09f0b3a451ae967a9f7001f333e61775.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2924
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595a7eacabcec6d236f431f69fc7d8b8c
SHA1ce08c8b9d10d5fd93d77745e724f40671f2e901b
SHA25678745f8da37b940d036e9ab4fae5b0ca2f479de7056a47d7b0a50536ed0f4aa0
SHA512a438035689ace02f2c995cc931d13369187c51b1d703616da947ecf50ac7828a5557ef7e0a36cf15cfaa549d2ea7ac40cba845d913e7605864b5a89f95b595ea
-
Filesize
600B
MD594d851137e470bd1eec0864e40b9afb0
SHA11e317ed121a99d0241d8d8cdcd188c6669375234
SHA256b76483434c5b2483bd1b871f5515d2aa34dae3514e957e4da89fbc897a64fc90
SHA512f533220f20e014ad401b0e9ffa179f580998d8ef97309914162b0292b3fd5a3e309293e652c1816f0d2d5db665574bc23fcf8e51a720578346dd20147d46e298
-
Filesize
2KB
MD59444a116dda22331a08e1fb5f2ddf225
SHA1e380137980d7285bc7677332b7dc053f945acf18
SHA256bdd2213dec603629444e64b2acb8ec1d2f010bcaeb58a8ddcca82600809b6984
SHA512f0619d0ab7b6cbd77ed4f68f455cf85a3a8702034b6e0dc901c77b63b41a389c07abd80b2a281532455dba2f6ef10df27172babf1d5f2f30cd75f8bb92bc3da1
-
Filesize
2KB
MD548ea881cfc85646a3792a01b64cb01bc
SHA120e09d964baffe46c26ad5a15609b8cfe2b61a2a
SHA2563c33ec59d60a8a8ebd8910bcc97d0d3332a93cc2ae063959aa19228cf2d04639
SHA5127ad234e72c568b654df42f832b40de97fc5afc82d6bb132aed5516f4a0ccfc9b944b8a3a3b5e7ca3563f7d2ba0f1e7ea1c78dc6c9325034e9dda216b8960ba62
-
Filesize
2KB
MD58d17236349dfddf9980181be4f7683fd
SHA1a34dd6eff2e340bdfa28dc5fd5f066f25bc283d3
SHA2564f473bd9df525647aa26562f731e455d4e13336a9a3ae23f95fd9573fa4eca1b
SHA512cfe484fb7ebc83bbd9d80d2be32eaa89098c515f3f8232cc06f85036197f6fcb82d889eaf0838d9f228b2965cd46526328e2efb4163ccfacda118784eb69c494
-
Filesize
2KB
MD58f3878c2ed9855a900d7af1bbd7dcf18
SHA19727a9b02805d7399e0b8ca1d087642308a277f1
SHA256b9396a78cf98bfe8f8230aecbe7791baff98589931534bf4e8d1be4db531717f
SHA512590898ab8aafc44f388f4cabfd24c35917ef7ca651ac8763ba1689cf6d89a806bac00eda191df1a3f640cab65d3297a0d05a3b47239fe7deecb2a3ccbe427f0e
-
Filesize
996B
MD556e7706c992b815bec289d25436a6c3a
SHA148092c6314cfa8557c494be68682e921dd8c67cf
SHA2564df94185da324f2a5208877378fb140d0e4ada609d74933e18adf6139b9b6d10
SHA512d0599090a51e520058cf07b393abfd3e9e4bbfa1c761b37259027981f1f791e6d56d818c682697c5f12ced6430dd0ee49d63e0bdf4626fd648151ec19e1336cf