Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 06:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe
-
Size
178KB
-
MD5
231c813d12836c2870d58d3cc88c7efa
-
SHA1
74f3f77519e563513369c6bfd73fd687ebac3ee0
-
SHA256
21a00430dc7b2ecf702b16f52227f7d558e9397b0d0e5f263416502c289ca3a0
-
SHA512
51a42872c84db394dd3ce8ecfe9ea8d68507a0970f0fcc967b35c1c7eb030b81737f60d61ca89ae1550e8ca4d6c4a2b5c28670d27604ffd0426b3ba49885ee30
-
SSDEEP
3072:/L/wyNqSMLufKePcPRD5kFR+rUr1YdDrgXvftX48yr2goxiX:/L/wXLufDwIR6d/gXHtXJm5R
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2264-13-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2284-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2284-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1080-125-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2284-300-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2284-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2264-12-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2264-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2284-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2284-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1080-125-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2284-300-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2264 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 28 PID 2284 wrote to memory of 2264 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 28 PID 2284 wrote to memory of 2264 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 28 PID 2284 wrote to memory of 2264 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 28 PID 2284 wrote to memory of 1080 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 32 PID 2284 wrote to memory of 1080 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 32 PID 2284 wrote to memory of 1080 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 32 PID 2284 wrote to memory of 1080 2284 JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe startC:\Program Files (x86)\LP\5E1A\424.exe%C:\Program Files (x86)\LP\5E1A2⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe startC:\Users\Admin\AppData\Roaming\A2164\AAF5E.exe%C:\Users\Admin\AppData\Roaming\A21642⤵
- System Location Discovery: System Language Discovery
PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD573d863fe613c23075dbeb64aa851515e
SHA145a5a0b64360b3a4fa6ea20f68b235087d00f312
SHA2564d07c4a47d74f5e0d5b6d2d78a58df2e6184b77b65565230da1a3b0cf21760ae
SHA512cab70d0f74af3f2661e75bd48c03d153c4f89ea24b298e575a92e2e82fcf272f6b14bbd683534eaf07c8defe614a1220bf055526ae8c0d82a35ce4fea5f34ba7
-
Filesize
600B
MD5d4f5a181c76f4c4c48d2eca1fdf191cb
SHA16a9ab6d98a95bb864e71966346b443f1e4a5370b
SHA256c4c5c932d4e0f9cd3d3964ef6da849cf7af1ef505b5edcbd74fb4d92b5cfe258
SHA5121cf9de5e3d1644f33c2f68f61570628af5e5b7a00e3328d910aaace3edd1d2f85138b476b62f95ceb16bd41b879442af1b47a3eef66d2418e39c7bafb803e3ea
-
Filesize
1KB
MD5dcba6633f4a1e256b770dc39d0e24441
SHA11a0d7096d758dc63448dae42030d9aaee1967e16
SHA25603b46487eff245617ce262a2e29b4c09df81dcbbd3f5b79346f1263f43d01f96
SHA5129209c26d82ecf74e2688523b2e9866530175d8a8ce18e72a9d3e9e0e5972b83dae449b163b7a800d9a0bc37bd3612b3847a9f3a87b011da59240bcffbc816a10