Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 23:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe
-
Size
154KB
-
MD5
30e359c36bb23fcfe3f3e53979f3e682
-
SHA1
37982fcd4fcb7c621141fa61041552eac5a429cf
-
SHA256
7ea55261d63c305789b23fa38856b71434d2b6c5981a4aa7b66215aeb8efff4a
-
SHA512
9581fd890f9254c08222cc75c605ed0bde67f4e7593715398c9e79b5eab4a1957b3b8462d1313183e84eff7a51598b928ff36cc0a00a9f625d92b8bc17fb534e
-
SSDEEP
3072:BF283I/QFxUbxq/Kvdj5Mn3jVFuTEW3k2YM73DNoAhowdP3vUf4CrPd:3VAK0xq2ai7klMnmAX3UXrF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2776-9-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2396-20-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2396-73-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2788-76-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2396-177-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe -
resource yara_rule behavioral1/memory/2396-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2776-8-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2776-9-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2396-20-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2396-73-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2788-75-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2788-76-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2396-177-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2776 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 30 PID 2396 wrote to memory of 2776 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 30 PID 2396 wrote to memory of 2776 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 30 PID 2396 wrote to memory of 2776 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 30 PID 2396 wrote to memory of 2788 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 32 PID 2396 wrote to memory of 2788 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 32 PID 2396 wrote to memory of 2788 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 32 PID 2396 wrote to memory of 2788 2396 JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_30e359c36bb23fcfe3f3e53979f3e682.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD506e1ed5fc8a11f09f9be05608302b269
SHA1a933c0e60561fff50dc341df874b4fcbbc1993db
SHA2567cf78cb659f324519680cf81aa6dfe1a300285732f0a27ba5d8f3a395439b9ce
SHA5125078237c38fa42ab88dca4234d677218b2d23cf9c579fffdc5961ed21a6486e60f553ca9a295ac47ee4ae41949081aba1f9d36a98994dc8e7eadd56a40aa6849
-
Filesize
1KB
MD586ed878f43f8c486ede86d6ee061ff64
SHA1b4144b59ab9a5a0dfc6b3ac215090a8ccf93c791
SHA256488cf9619bf3f73771a902301faa682cccd3f34baec0d70b6dd3878fafd5f930
SHA512360049822b0539948b4a239a428047fe772fbaafd5c95cb3af0ab5d2dc572b844b267d328fa4aa0f2004dc9aa8fd5ff5f95c9b0c8814ab40fd0e0679486c4d02
-
Filesize
897B
MD56af13f26e94bf9dacbe8ccd06241f888
SHA129d1161431ce244654ce1bd6ec75a92a2a3162fa
SHA256382feee78addd0f26a5801bd754c6cb99f10b352516c54abbd57057d1bf81da0
SHA5121cfc2af22024c9e63847aada3e7b66d1a7e089c21a5f97cbebc04f8c8064c4c2c54213d3425e85ed73199005b59a3f0e3e1e22562a7595b379ebdcf7cf44a5ed
-
Filesize
1KB
MD50b78ecb486d3f1a4843b063fcd22600f
SHA1d1d9de516e52017f6c7029bcbd16e684614d3a53
SHA2564a8900e14da1d84e83b38fa9d14121bfc5656ac1ad19edc66e7065d3bbd43cb3
SHA5125fb7c18df2ead8372d2307801361b01861df166d86c03c84729e49b137ddf6d51be4ec11bd23e6048ddec62930b23b83f0ea265c14075655a42b0a6b4bc91eca