Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 00:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe
-
Size
166KB
-
MD5
1c8f3ac2263bb7f996ee7685ed3d84e4
-
SHA1
bbe0e7a306b021674dde855ae3abb18ecf7c421d
-
SHA256
4e62c11c9b8197de0d44869bb9710576341fe37301e931c4b8da665961652c4f
-
SHA512
97c4d4876b068c404ef0b8f4bc1d55fe3523f25805c16fb075bd42faa834a85cc867a033d0dd6cd6bdc0ea742ed38c7b1ec6d88a32279d11747cf471e3f2ba0f
-
SSDEEP
3072:vufEwW90LLrjzeNaDaW1S2XyabQNPxPHtHTk8cRB:2sF0eJW1rNbuFA8oB
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4200-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/548-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/548-66-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/4844-69-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/548-173-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe -
resource yara_rule behavioral2/memory/548-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4200-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4200-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/548-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/548-66-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4844-69-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/548-173-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 548 wrote to memory of 4200 548 JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe 84 PID 548 wrote to memory of 4200 548 JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe 84 PID 548 wrote to memory of 4200 548 JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe 84 PID 548 wrote to memory of 4844 548 JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe 86 PID 548 wrote to memory of 4844 548 JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe 86 PID 548 wrote to memory of 4844 548 JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:4844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2eb43a494f4b0136bdcf1948b05ca39
SHA1170f7395a92b032526e482c0cd28b022c8b5f39f
SHA256d58451449cb411a057b7ed3fa6484d1d01e2a8dff77b634b981cd477f07778bf
SHA5126d26bd4547714738082d64a7a555fd0f01ba27e21ecff7074b8f1dd226dff603e10acff364cec74c7bbf0089c0a659fa63035081ac60d297ee0f4d00b9168a17
-
Filesize
600B
MD50bdfa128762e58a4de3a6db642a56849
SHA1ac57285cfa1456f9258081e68cdc0b7572031958
SHA25676be5c72c3c112d7db244560577832a2548d80748605dac001c2d0197e19b22b
SHA512329d19b410cc2b26644471c90fca2dfff155b28aec8705d6c9e6b7ec844cccee840d02a1395622462e96b6b75a18e708fc62529321f4f893e1726af3c94e5af8
-
Filesize
996B
MD54db5f971295c69ad9621b71595785e43
SHA1dd4bfd98d465b6fd5286bf0f99aa720e9e6d6cb2
SHA256a5001cd97297cd4f603263182ac4a4813aefcbec52d682f6a1902680fb548cad
SHA512e6674c48b7d8e373df353c7bf069539e882f1e3b4bf46c70e0be35e5ebd6813c0a9bd6593f943b162cf9585384baf9e84a6029817d2a93c499b1df957ea7d2bf