Overview
overview
10Static
static
3JaffaCakes...34.exe
windows7-x64
10JaffaCakes...34.exe
windows10-2004-x64
10JaffaCakes...34.exe
android-9-x86
JaffaCakes...34.exe
android-10-x64
JaffaCakes...34.exe
android-11-x64
JaffaCakes...34.exe
macos-10.15-amd64
JaffaCakes...34.exe
ubuntu-18.04-amd64
JaffaCakes...34.exe
debian-9-armhf
JaffaCakes...34.exe
debian-9-mips
JaffaCakes...34.exe
debian-9-mipsel
Analysis
-
max time kernel
897s -
max time network
848s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 13:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral8
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
Resource
debian9-mipsel-20240418-en
General
-
Target
JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe
-
Size
188KB
-
MD5
0f1338e1991adc7f282be7b9bf1ff834
-
SHA1
1f10d0ffbe9ae4e312d7e0b435aeb4a04fd70efc
-
SHA256
19e9e59ba2f284bc7df20c817e539b04bd76883ea85c7635b5f0bf3b35a2761b
-
SHA512
792962ab530720226285324a09db8712a41a6dfbd47c0ff28a672f9ff70bd8ca764a3737033f32d809127282a44dcbd58f785fa4b58e2d278d293a45138fe5bf
-
SSDEEP
3072:bjNiyF5DyhIFYdZrmM4n1XvudI1V+6rdj7xE3GSo3ln+xRf2RKoUY6u//Y7KoO:XNikFyCFYdgM3dIBr5i2Sa5KQAt
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 13 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/3056-12-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2208-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2208-14-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2392-125-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2208-276-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2412-291-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2208-293-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2348-295-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2208-352-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1060-557-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1940-670-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2512-799-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2344-803-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2208-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3056-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2208-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2208-14-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2392-125-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2208-276-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2412-290-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2412-291-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2208-293-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2348-295-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2208-352-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1060-557-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1940-670-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2512-799-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2344-803-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1688 msiexec.exe Token: SeTakeOwnershipPrivilege 1688 msiexec.exe Token: SeSecurityPrivilege 1688 msiexec.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3056 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 30 PID 2208 wrote to memory of 3056 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 30 PID 2208 wrote to memory of 3056 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 30 PID 2208 wrote to memory of 3056 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 30 PID 2208 wrote to memory of 2392 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 32 PID 2208 wrote to memory of 2392 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 32 PID 2208 wrote to memory of 2392 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 32 PID 2208 wrote to memory of 2392 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 32 PID 2208 wrote to memory of 2412 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 34 PID 2208 wrote to memory of 2412 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 34 PID 2208 wrote to memory of 2412 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 34 PID 2208 wrote to memory of 2412 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 34 PID 2208 wrote to memory of 2348 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 35 PID 2208 wrote to memory of 2348 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 35 PID 2208 wrote to memory of 2348 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 35 PID 2208 wrote to memory of 2348 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 35 PID 2208 wrote to memory of 1060 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 38 PID 2208 wrote to memory of 1060 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 38 PID 2208 wrote to memory of 1060 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 38 PID 2208 wrote to memory of 1060 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 38 PID 2208 wrote to memory of 1940 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 39 PID 2208 wrote to memory of 1940 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 39 PID 2208 wrote to memory of 1940 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 39 PID 2208 wrote to memory of 1940 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 39 PID 2208 wrote to memory of 2512 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 40 PID 2208 wrote to memory of 2512 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 40 PID 2208 wrote to memory of 2512 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 40 PID 2208 wrote to memory of 2512 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 40 PID 2208 wrote to memory of 2344 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 41 PID 2208 wrote to memory of 2344 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 41 PID 2208 wrote to memory of 2344 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 41 PID 2208 wrote to memory of 2344 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 41 PID 2208 wrote to memory of 2728 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 42 PID 2208 wrote to memory of 2728 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 42 PID 2208 wrote to memory of 2728 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 42 PID 2208 wrote to memory of 2728 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 42 PID 2208 wrote to memory of 1944 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 43 PID 2208 wrote to memory of 1944 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 43 PID 2208 wrote to memory of 1944 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 43 PID 2208 wrote to memory of 1944 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 43 PID 2208 wrote to memory of 2864 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 44 PID 2208 wrote to memory of 2864 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 44 PID 2208 wrote to memory of 2864 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 44 PID 2208 wrote to memory of 2864 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 44 PID 2208 wrote to memory of 2956 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 45 PID 2208 wrote to memory of 2956 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 45 PID 2208 wrote to memory of 2956 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 45 PID 2208 wrote to memory of 2956 2208 JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Program Files (x86)\LP\4348\174.exe%C:\Program Files (x86)\LP\43482⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Users\Admin\AppData\Roaming\89E2F\36143.exe%C:\Users\Admin\AppData\Roaming\89E2F2⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Program Files (x86)\LP\4348\174.exe%C:\Program Files (x86)\LP\43482⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Users\Admin\AppData\Roaming\89E2F\36143.exe%C:\Users\Admin\AppData\Roaming\89E2F2⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Program Files (x86)\LP\4348\174.exe%C:\Program Files (x86)\LP\43482⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Users\Admin\AppData\Roaming\89E2F\36143.exe%C:\Users\Admin\AppData\Roaming\89E2F2⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Program Files (x86)\LP\4348\174.exe%C:\Program Files (x86)\LP\43482⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Users\Admin\AppData\Roaming\89E2F\36143.exe%C:\Users\Admin\AppData\Roaming\89E2F2⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Program Files (x86)\LP\4348\174.exe%C:\Program Files (x86)\LP\43482⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Users\Admin\AppData\Roaming\89E2F\36143.exe%C:\Users\Admin\AppData\Roaming\89E2F2⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Program Files (x86)\LP\4348\174.exe%C:\Program Files (x86)\LP\43482⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f1338e1991adc7f282be7b9bf1ff834.exe startC:\Users\Admin\AppData\Roaming\89E2F\36143.exe%C:\Users\Admin\AppData\Roaming\89E2F2⤵PID:2956
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD509977158ffc0d346c3bd3effc57bc754
SHA103370e941b6a982ff291e904728682b91e02fc7c
SHA2563794a3779eba825a0e42992e1f70e3ae1d0314b0d3e8d05d1351a242adab4ef4
SHA512db482ceab6feca7e583ed167cef3579dae97a8dcde79179bf5c79069b3e164284761d7dfe27344385a3a5478811b799727a90e05871b0c8a18e97737c68e3d8a
-
Filesize
600B
MD5d81f8d45724f780b9b3340932d33f7d1
SHA1709f040bbd4838d2a42069805e9c27789adae6ff
SHA256ce47fa870f0e538f8653056f486641fcf279b912f0b830a235a63d0ad0cf0fd9
SHA512c8b15d2dc105b2dde7f68b6c2b624d70aaa78fd5a617d3e3b65b72da8ca52a2d81d615837c7e0863741a2f796377763329c3406c0ae9ee2c8ccbb322d66e8610
-
Filesize
1KB
MD52d2472bcb9e8ed3227abeaf5c18788ae
SHA131dfb35dfbcc04ae9aa5a28a633b769daea39b6a
SHA256623e626fc8da709c7d8f04ef88e53c10730a2dd8068f7aabf7349f7163a1c538
SHA512645edb23983ff66c97b4fc86d22269b92ed7d4650009c0cb17a3807b22ddce639d959101f744c81f190d53f731afea31dda36f58b97ce5f320037b068f1e097b
-
Filesize
1KB
MD5ce8e44927c31cc055b3d2a6810d2d530
SHA1eb0933a57a88a2f5cb273f9816945d8e416ad6cf
SHA2563875bd5c692c2ad0b1c6b8e97f0350fec1493a1df3b97e9ba3d081a67777c3c2
SHA51262bbace148dd65413e217c7599ecece76a7c3c37567683a0389fcb272675190e69cbb6c6063c12f3c83f6061818b16793711da9f0240dcd9c05f94eae6a544ba
-
Filesize
2KB
MD5e17f7abbfba2b12f1175148fc3331ecf
SHA1e4586ada055741cbaa0843ffa05246bc3a856847
SHA256782b6cdc38f1b03843188c20e1705cbcb5db3a895fc1b4faeac872327ed46d83
SHA512045662816f00d57d8e1698132b7b37b65ee8571becf56a744359fa1c39f5dd60e8ff031081f53314195a75e649becc1c2221971a2dfab17e254e1a12fdfcbfa0
-
Filesize
2KB
MD5a0ebe17b280ef1fd35bab805b2230b3b
SHA1a0761da0bad91b9ca2cd73d6da0b9f5aa5fd7aed
SHA25639163016a0b237ac7d00f5e0094e1646f04ffcc6d4ad045d9b88b2dd73251d42
SHA512f7802bdb821f38f00ce4b391077baadbcedc50c5a90826be0f05ba5007193ac57785af723b8cd868f22d0911634e429d7d4ea306ac7a7b5257e32faf9f2d99f5
-
Filesize
2KB
MD56d1791a951092b0efb28e76c923da44f
SHA1358938709d1ca50babac3cff3aea178b1dbc7ea8
SHA2564777b79f786d4625526e68d181d76a357d625571eaa1cbec16411cfd56dc6196
SHA5120fe9d311107748d160db0b5d6b127b8dcfb2bed47285fc6b1174d90b14f0d90e302d6f73c0693baf9c520df97cbced26ad587d975a0b1655d1a94d93146aeceb
-
Filesize
2KB
MD50cc968cb5b14eb17280c29d81cbeffdb
SHA192279eac310d23ead5e339bd8ff11cba27b0e787
SHA25604b0bddfec89da3eb2c73f313daf63e9ef5ef3e41d6492bfa03a53c354141b98
SHA512bae951ffd795caaa0fa08a24b679fe74918f59f9d1ba6ccded2f600cf316a911f4883c16fb6f9c80b29603da2361373e1694ffba7a2cf962ac4cf26e051a7bc2