Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 18:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
-
Size
201KB
-
MD5
1557fa7019d5d281a1b8c878bcf817bb
-
SHA1
fee022f9e73695c68965db8a1ae86350b56db7c7
-
SHA256
9c6f9ec885396ea45f06b2e426e7d5b2b942d60a1ab868a84275987c09984a05
-
SHA512
ff25e02906a717eea3107846b08d4ed72f1e86f6f16eefe79c83a1b68e2e7bdda9e2ceb6a90bb848edf0c10f652211a0854db5c31eaa0930b364e9e54222386a
-
SSDEEP
6144:VwGPqheAAyL8sg/z941Pv3KFsrhWF99+bksg+:VwGay4Pg/yR/Hte94osd
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/644-7-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot behavioral1/memory/2324-15-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot behavioral1/memory/2596-77-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot behavioral1/memory/2324-178-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2324-2-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/644-5-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/644-7-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2324-15-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2596-76-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2596-77-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2324-178-0x0000000000400000-0x0000000000449000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2324 wrote to memory of 644 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 31 PID 2324 wrote to memory of 644 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 31 PID 2324 wrote to memory of 644 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 31 PID 2324 wrote to memory of 644 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 31 PID 2324 wrote to memory of 2596 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 33 PID 2324 wrote to memory of 2596 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 33 PID 2324 wrote to memory of 2596 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 33 PID 2324 wrote to memory of 2596 2324 JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56eadb091a8920c68a150fbcf5e2a87f3
SHA1e9c9b3c95d1d2cd0f3ab40cc9f5471ce5abed24d
SHA256846d30b78b9110c2bcd1905476bd18c6bf7e0b248ff698d746608643537114ec
SHA5123de121345702c1a5f1450624a5f66ec9fa52588c791865281e0f99ec8c7158f6e0a08c0a61df2575b1f5cf4ffafb4e306469ea345e34e89069dc883481069bd7
-
Filesize
600B
MD55042ce8efaaabcca5188e141495494c1
SHA1234575b041a75d9611c95944a5399ac788814fd5
SHA256880028725c79e2ccb4d5e1915840a6a6e3c570741a3c50ab37b2c8935e60601d
SHA512251ec2fb1a3641c6320a39d225030ceaa5dbe1b1dbcb872a8a5c60670764c348db2d8b6b10a9d4c440644f57df3e5233dd1d4adee50630f6808c52db0ff655c5
-
Filesize
996B
MD5d7fbb0092898f24af0eeaec8b00d7f20
SHA10cd74415e925e5ea68f0d61038cb53c7b859b509
SHA25665b3522e90bd9a93bcf48b405ab3d57a252803800648b80c5b5b47b4b30e88b7
SHA5123deea38e944504b00ab8c5516c52c1e365739371c55b7e16f4d04a06c72273694d2200eb6ff4778c6d563b80faf1cb9e42906d0db92d1aae76ed1bfd4591b98f