Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 14:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe
-
Size
212KB
-
MD5
1128afe54d77bc854e931acfddd88a64
-
SHA1
7ab6bffc762e3b0ca9117edbb6355f79fc941ddf
-
SHA256
6729a9416994f6232b1078334bd2ba6c7f79f059e673c3e21c7cadd0b0a949d5
-
SHA512
d49e308acde4faf5cfcfde54cd57a46a2195685b93c14e830e07d16a3ef46d17adb5f9d182d08526e8752acc979339b1c544549ec464d0f8625c7f435a6bffd7
-
SSDEEP
3072:Mt959W8lgzl/yNauKpiqFXJwEvPH+pNx/sRlX96aq1gpz7BwECAgS8eP9gFh+HL:MtDXau8lXJHXuDUT6rgV9SAgS5PS3+H
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2748-7-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2788-15-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/1804-78-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2788-181-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process PID 2788 set thread context of 0 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe PID 2748 set thread context of 0 2748 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe PID 1804 set thread context of 0 1804 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe -
resource yara_rule behavioral1/memory/2788-2-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2748-5-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2748-7-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2788-15-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1804-76-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1804-78-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2788-181-0x0000000000400000-0x000000000044F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2748 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 30 PID 2788 wrote to memory of 2748 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 30 PID 2788 wrote to memory of 2748 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 30 PID 2788 wrote to memory of 2748 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 30 PID 2788 wrote to memory of 1804 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 32 PID 2788 wrote to memory of 1804 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 32 PID 2788 wrote to memory of 1804 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 32 PID 2788 wrote to memory of 1804 2788 JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1128afe54d77bc854e931acfddd88a64.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b05b567897d79f7ffdd9b113a6753438
SHA1646ddc6c3ac9c18f14abc456ded8db44e9a812e9
SHA25683f7189dfd8982a8333cda36951b63a64e6c1498d35e57e759e1c37d0662b91c
SHA5120a5c548d6bda57bb8c578d56777212f6800ca5871becf12669d52fb0466d9674baee617d0d8a85dbfde288f9c14ad456cfbc5b65428158cfc67bd4720ba93282
-
Filesize
600B
MD5aeca2c2ff70ac5bc1e8c27e964d21676
SHA148c2c19bc437c24c2a3ff4d10b5c20552ca7b9a4
SHA256fe5273a6c8118476e32e093545ee067d46df5dbe0e2107b889262d16fca82e9c
SHA5125118b7e80c8b3538d205c87cb07d6a7bda4588b4b5d258d5fb0e6a4b510289e29e6ca46f4ce5762e9c5065cd8f94a8dd6993ed53bd647fde00f02ad9faf2c43c
-
Filesize
996B
MD5a299ee12d84a7c51bd966141a4927009
SHA1cb287fb5b3f3ae77a665c04cce0158ae38700641
SHA256d18957894c5f61b05d06469a6269777c66e6665347ea9303c13d48b839904feb
SHA5128e6937e6fc9db2d82aeeed4db8b12023f1b6e99e4ffefcf83a986ee17df000a197a1042b47db54ecb64f3814b6442ecf2b4aeefae9c015f4ad91842ab2764510