Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 11:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe
-
Size
185KB
-
MD5
0e0ac0f1e5b392d635d34bc3369ee155
-
SHA1
70ce8250d0da2bfa5a0ca44d54083269256434ba
-
SHA256
4cc039adfbacf1c0a30b8f6a5d08ad372c187d7a836455197b2c5870e3e4b0ae
-
SHA512
9463f39e904800de50eaa2f86f29ed580209ed589cea0fe61a3fa896b64b51d9238ddf46ceaa94686aa0f938bb59df81079cde999517c5700b2a89ec0bbb4756
-
SSDEEP
3072:I1HoHq842/wG+HZHV5VQ217AP04by0aF3FRnXk3fjf6pitrFar:I1Mzwx5tQ217Az+RFV9X6bwizU
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1856-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1960-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1960-17-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3028-82-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1960-181-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1960-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1856-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1856-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1960-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1960-17-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3028-82-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1960-181-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1856 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 30 PID 1960 wrote to memory of 1856 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 30 PID 1960 wrote to memory of 1856 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 30 PID 1960 wrote to memory of 1856 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 30 PID 1960 wrote to memory of 3028 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 33 PID 1960 wrote to memory of 3028 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 33 PID 1960 wrote to memory of 3028 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 33 PID 1960 wrote to memory of 3028 1960 JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe startC:\Program Files (x86)\LP\1A9F\EC6.exe%C:\Program Files (x86)\LP\1A9F2⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe startC:\Users\Admin\AppData\Roaming\F3AA0\B643D.exe%C:\Users\Admin\AppData\Roaming\F3AA02⤵
- System Location Discovery: System Language Discovery
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e473422386af36ec27bb545fde3d83c5
SHA11c7ba730e3e6af2d9f97c9ef755eec556015221b
SHA256c5fb008300aeb128ab128bf32a426d168a174e42b9b0d64ae51020fe1b27e199
SHA512aa0a164e9c63a393923b4e4198f7b149f53c1040f0e6dc3057d01c6266a5b8a93ec4c274673ac6150b5659f4a85996340aa5b4ca6fe0e2b673fae6466b0ef4e3
-
Filesize
600B
MD53991d84725195f367585c6d59a6aed1a
SHA1bbc93060a85f0d58e921ed3ba3cc72c827786054
SHA256c1a4d58ca4cd8bcaa23eeef936942578d382ba1e31429738ba7862c0fe3e3d69
SHA512c734b2aeaa85b1695b1fc9ca4dc34c8cabb194a02e0bb4ab4a9474588194b60af881e07a13eb2c2fca360a4e5f840a499a1a70ecb9ce573b135dcb567ff646f0
-
Filesize
996B
MD5fbad12bc7d053a02f12f45acbff962bb
SHA17dcb915ab0696abb81964fb84e3c3de440d14914
SHA2569e44c8a6bfe875680d9679fe3139ba2e03fa5734f063949416be5e7ce19f056a
SHA512212479786e02fa0868eee8f50e5148665e24ec74e4937090630c14b755aabb1bd0f393bd5fa9d98aa801fddb79d2667f254af5ef38c7185173612b7f6793b41c