Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 20:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe
-
Size
176KB
-
MD5
1794cdd710d6b7ba8b1b60f9ea7afcc9
-
SHA1
36538a6eda4e155e81005958ed928d973529e0c6
-
SHA256
ab30ffc64f2bb6581505a6cfb4cea9fd07d13b0e7c27677f68c3296cdbcae353
-
SHA512
f811c8994d90ccc771507e8511ceae05cd6cdddaecc5de323e0b7600afdef305ce909ce5bd0457e9cb799a539deebc1a97d7e02a4cf36f0a4894771ca9d23b2b
-
SSDEEP
3072:Tq2UvckSVtQC3/xteR1caD2jDu7CyVY/5AB+NUxVlZWzu0ZJxh2Q9mhpx0D:9U0VVP5kHtEDgqBAeMAu0ZJxhfkz0
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2384-9-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1916-20-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1916-90-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2024-93-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1916-201-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1916-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2384-8-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2384-9-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1916-20-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1916-90-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2024-92-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2024-93-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1916-201-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2384 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 30 PID 1916 wrote to memory of 2384 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 30 PID 1916 wrote to memory of 2384 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 30 PID 1916 wrote to memory of 2384 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 30 PID 1916 wrote to memory of 2024 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 32 PID 1916 wrote to memory of 2024 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 32 PID 1916 wrote to memory of 2024 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 32 PID 1916 wrote to memory of 2024 1916 JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5a01fcddc349065959294cc3a59259873
SHA1bb16b1279c74d3164cbc0b7a2215bbc770eca7d1
SHA2568ea5e4d20f571d3b6e9fc6445b06285f75f5f1d12bf152be9b4771e3091bfaef
SHA512f4ab57f18859eec6caf748c2755eb14e214c7c570af8ac4edeb6e9d60d8dbf09544d634812dfef6d4b9e0e4665cc6407dcd266d6a3c57807ad3f504e10e9a914
-
Filesize
1KB
MD51078d0bc366da6ad8ef4bc651d061bc5
SHA197223f089c879295f604296baaf53952a7ca1164
SHA25603f69dfd71b13387067ba5b98c736b8c45210c65da159d43b556722f3697f338
SHA512bc5a7cf94cd98e00f32245cf5a8994132272521665c539c0833c3522531dfe99bf62f26c7cf4d3d5831d4978adfa10029e021f2daf426450e3d1c66bfbfcbd25
-
Filesize
897B
MD5a56a09ab355933012f73eced7c66230e
SHA171ab3f7fd700f050a1f598f3297eceb84ad8be36
SHA2565d38bc174733aae891b60d6c729f0952b797ffb1d6480796fd98d9a5cd6ba1d3
SHA5123edaf4568c84437986761954a21aa95ce6a7c827ad0941c33c25956f3fd92a812826e894efd09c13651c656327c194275435ba5a6b9161a0bf9e1c4b5e2dac32
-
Filesize
1KB
MD5cccf86dea4fedeaedba0866273925781
SHA107015b402a9fd6df5b49c1dcbbfd684d6d23b4f8
SHA256f809350a8b4bbc1ac1b0795cd0fef6314862692e575fa5a1522cd65e700f88a1
SHA51215cb2c1a50c1bc4a0e85595536287075aa31a9bd4d8e02bef1e00e646956a23ae2cc9e012631631056249d23ccd9e892d5448b796854c5d263b84e331537b7bb