Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 08:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe
-
Size
172KB
-
MD5
25865e7d35e0b4518b95071c887f00dc
-
SHA1
67d0e05d6aa014b1a5d6ed1ba74362c012249e4f
-
SHA256
ae8894582479d445288c34d4fe8571f5ff4f064c5c5a0044f6f63244631ee3b4
-
SHA512
e9f29d35a64204c342684134fde7e6b0f2d0ba9a9db973d2806eaa07bdf28fba6478119bca2edcb53075cce4950689166fd9d294d3ec4c89109f993c01c58680
-
SSDEEP
3072:bvTDGdtRjfZOsgrJQSwFvSa5XPY+N/u0rKlu+1dMIkDs0QN3lA:SdLhO3JQ1FxXPnDeu+XMI0Qg
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2700-8-0x0000000000400000-0x0000000000462000-memory.dmp family_cycbot behavioral1/memory/2700-6-0x0000000000400000-0x0000000000462000-memory.dmp family_cycbot behavioral1/memory/1064-13-0x0000000000400000-0x0000000000462000-memory.dmp family_cycbot behavioral1/memory/1988-78-0x0000000000400000-0x0000000000462000-memory.dmp family_cycbot behavioral1/memory/1988-80-0x0000000000400000-0x0000000000462000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1064-1-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2700-8-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2700-6-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1064-13-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1988-78-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1988-80-0x0000000000400000-0x0000000000462000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2700 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 30 PID 1064 wrote to memory of 2700 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 30 PID 1064 wrote to memory of 2700 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 30 PID 1064 wrote to memory of 2700 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 30 PID 1064 wrote to memory of 1988 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 32 PID 1064 wrote to memory of 1988 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 32 PID 1064 wrote to memory of 1988 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 32 PID 1064 wrote to memory of 1988 1064 JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25865e7d35e0b4518b95071c887f00dc.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5365adffb8a28d5a7cd2712ee7cff4954
SHA19a91da13945ffeb67417eff5669a49e77f18b017
SHA256b7a62b8a47d006cb605cf1896fe9b1f74d9a4abffae1eadbfa78f188f161de71
SHA512496660e91bc1f71cbab25979bd7b3f2f70fb1be8c4db413f80f1f38fbb3f674445bc426e810dcdd14c6a7da0393c1f06327514f8c8d5b77cd700f073151228e9
-
Filesize
600B
MD5cbbf05fc94de6ebc6387611ee3f61e80
SHA1a51a5e15784dac56d0510a77312b6bcc2855da4a
SHA256b6e4d943f4d7c86390dcb138b6060edb2c5b1ae87edd53bf5ed0cfef0996bc43
SHA512d51b6eceaf90b8594a89cf5bafa0b0cda36eaa6b7f93160b7a003e5171a291215f57f259a2279fc089d9e65d95506f579988bd6bdb53e1988b9d0726008cb0ac
-
Filesize
996B
MD52a0876fca16124cf13076ac480e47443
SHA10e5e94c9a43ebffa4dd6c037dc4d7653143ec2ca
SHA2563df18d4825cf6e1051012a0bc8a050755036ec1a0f58dc062ea26ffb7db49b94
SHA512ede7f8a2521ac128b8cf90a67ec4ec5cd58a07d05400975fa7de2d0d115f5b696be8b1b81d921090434a2446b749bf0f4c09b803093774099d09a5bc4f7bca3d