Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 15:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe
-
Size
181KB
-
MD5
12048b510875ae3c3c744244e3f9f09b
-
SHA1
1a34824a81495d2f047e60db180ef07fb5071c1d
-
SHA256
ae655a7063f9efde72f84bed74065a78f82ba01d1ec5ad9ccf88c686758c45c4
-
SHA512
eae758a69ccf53c6a795eaf1eba82a3ac5cee118f4ccc22c8cbf25887f0e85b0bd87e8da00ee40457b4e0edcadc71d1554a20dbab97b8f0d37df5c5fea1dea5a
-
SSDEEP
3072:Oreq4UUt6HvDPIqLf0vF9EDFAO9Z2DAbdhlL7pFHUWVV+dvVsl:D31qDP3LTh9Z2sbdhTUdsl
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1080-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/4592-16-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/4620-77-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/4592-196-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4592-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/1080-13-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/1080-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4592-16-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4620-77-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4592-196-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4592 wrote to memory of 1080 4592 JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe 84 PID 4592 wrote to memory of 1080 4592 JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe 84 PID 4592 wrote to memory of 1080 4592 JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe 84 PID 4592 wrote to memory of 4620 4592 JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe 85 PID 4592 wrote to memory of 4620 4592 JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe 85 PID 4592 wrote to memory of 4620 4592 JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12048b510875ae3c3c744244e3f9f09b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:4620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53cb4cd15025eb55d81dd65a5324f2771
SHA14af1a8dc66ac42975d764ed8ca5752c83d1a3ef1
SHA2562ae808b51a39e63b9a3164f753228f3805823ff44d4b51023a38382f1e53b801
SHA5121d42751c87559428d77ba80e58d59db15eb4d0df7bd302162a300e993abdd8bb191b73a5053f3b55cab7352922e80d2b54da2512a559a5cbb571e7e99dd5b237
-
Filesize
600B
MD50409a301dce69c4746bb49453738e265
SHA1bccc254bb53923b0199ff4cacd4190127082231f
SHA2568d9fd9be1450af9696eef062cc2e248325c31e52720be25a19982294dbea9a4f
SHA5124ee7385707ab69d95b788de2aac9807c92c60d475b4cb0cd405fce708b6855969cec482c6977a98a394d1fdd6ac1892ad2c237b3440777b6cdde11162f465fab
-
Filesize
996B
MD5c633bab4993651b8e046e43c72993ae1
SHA171485a6848acfc03c83554438c0f0dea98bccb46
SHA2564bded2fb45b08b8cdda2f75246cc68d1e7de1cfb1e4a31e5cbb2e11bbb06306d
SHA5120b442a4f138b3b1b79ba0d5d13feeb6434c52d751aefcb0577b9ecb05c27e0151686c1a4b784ec9075d9e8ee9deedb3accdf4da12d50619b7fdb33d73dc0f876