Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 03:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_20460809f2608eacd737b850a0e44410.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_20460809f2608eacd737b850a0e44410.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_20460809f2608eacd737b850a0e44410.exe
-
Size
186KB
-
MD5
20460809f2608eacd737b850a0e44410
-
SHA1
6744a7798c23c3deb2df6922556cb4e519986dfa
-
SHA256
66a81de263d39c6e6c435df1b9ed54bbd7567fb949fef98c3d071f9f171e960e
-
SHA512
10e64282441f652f97b584c299957a820a25e797e104cac0b3f719708912adecd8441db8dcaee557b175bdec2c099e30d7201cbfac2bf198f33c73c7e4385bf4
-
SSDEEP
3072:cXqjA7PrysZG9h9cBO3klmMU5+RHGKPS3MNlJ1mfjNgHC0q8Tkm4:jjiTys+h9V3QU5+1mrNp0lTF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1972-13-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2672-14-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2608-71-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2672-72-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2672-178-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_20460809f2608eacd737b850a0e44410.exe -
resource yara_rule behavioral1/memory/2672-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1972-12-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1972-13-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2672-14-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2608-71-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2672-72-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2672-178-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_20460809f2608eacd737b850a0e44410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_20460809f2608eacd737b850a0e44410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_20460809f2608eacd737b850a0e44410.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1972 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 30 PID 2672 wrote to memory of 1972 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 30 PID 2672 wrote to memory of 1972 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 30 PID 2672 wrote to memory of 1972 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 30 PID 2672 wrote to memory of 2608 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 33 PID 2672 wrote to memory of 2608 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 33 PID 2672 wrote to memory of 2608 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 33 PID 2672 wrote to memory of 2608 2672 JaffaCakes118_20460809f2608eacd737b850a0e44410.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD563fba2b3747b846013d4238b03c88078
SHA19cab838c8805006c631b831c50c8bdc44f28f39c
SHA25638e5206c06f3fc8cbb5611eebb0cef45aa0f05fdd4fbc106bb58fe8cd0832ad0
SHA5123683ce752798145dac954496dafd4547472a5b1e5789d1c41f359c690e78eec912eb277d672b6349301a454ea55f374867cb89523b8e2c58d9122c222d2d6671
-
Filesize
600B
MD581aa34a82b44d8f88e346f4c13593dfb
SHA1cc362641eae1956d7fb42f227d65b7c68c6d97c6
SHA256326ab217229b38beaa2c2827e5301d0bc0a58cee87d741740ecdad9d79c8b983
SHA5127b243fdb6c911e8c5b7fe5ae2d58b7a816415f2767f62b9deefae571de220f16d49c17a59f7ab4487f98ee9d75b4d9e0630bca75c27c71b73dcb7445cc2625db
-
Filesize
996B
MD5b1b0c005f29d0e7ce6618af97bc8792a
SHA17d7b1604a477a7c9898c87202903c046b10d3ff6
SHA25600b2edd47f75480186338daada385274e19f5be6c80708cd58e452b7775267ee
SHA512606620a58b9cc0ca150b0ca5178d3ddd4b2aa8f3f003752fac7c1bc92c96fbdec914062d515eadd74227a6deaa430ee78105d5ca5f4a96642b072ec21cb6b06f