Analysis
-
max time kernel
140s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 08:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe
-
Size
176KB
-
MD5
25a1d513256a4c22796c8757b498526b
-
SHA1
106854a11fb6694197cb41140b0d235511194d0d
-
SHA256
ab30a0ba23aa61cfcefa3c86b23d84b5a09be3d2920875f912ac7b64fcfe2324
-
SHA512
9e2f1353b2c049be39006a11105648e20c1b9a75714cfe2bddfdf9db9cb5e655595740bdb483515667c64adedab85e9170a57c584f1a1321b50e7726074e2c40
-
SSDEEP
3072:IuFXluw8oIUbF6iYhSd083SmFha/MnUXM6mGemNbdHumbfEFJgWR564p+C:7Nl4oI7ZP8j6/G3pZmNbdLfEFJfC4D
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2272-7-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2124-15-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2184-85-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2124-184-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2124-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2272-6-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2272-5-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2272-7-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2124-15-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2184-85-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2124-184-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2272 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 30 PID 2124 wrote to memory of 2272 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 30 PID 2124 wrote to memory of 2272 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 30 PID 2124 wrote to memory of 2272 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 30 PID 2124 wrote to memory of 2184 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 32 PID 2124 wrote to memory of 2184 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 32 PID 2124 wrote to memory of 2184 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 32 PID 2124 wrote to memory of 2184 2124 JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD592525334473f832054c6a80cafe5a969
SHA1f5dc0df9c2eaa6d19168c66bb1a5058e861401f5
SHA256424af2249d1478ecf5b5e26ae551450c56a8bc444933845b0604f41f1aa2ce08
SHA51285647c3db36cd19c60d746e51b263f1d7a4213e885b1a79b009c83d30f7f36160977cd8b6f3e4b54b669c9cfc215033a53ad80bdc821ef15cd7b1d33a33cb829
-
Filesize
600B
MD5279576145d00ecea37ba07f3d7da84b2
SHA1fbe35fea2d6838cf6ba82cc3e9ad9f9905fe9857
SHA256f0e5146547fac69cb3f3d36f3bb281c8225fdad552f1fbbfa706a69e2f0492a4
SHA51291f3d61c1da4c79f65d2ef699d3703cd357b36ef833560a35644f9ea874e3fde065786b835efeeb872061d9619712720029cedd9e6f2de239b90cb5ebf1b43e8
-
Filesize
996B
MD5e56425f91bd1e2561ec9d74a9198d92c
SHA1c3877e6a82af115c5512540a331d8c675572e1f0
SHA256290661a590ace3cf96424a96591af178bcc47a1e5162577cc183fa9d549968b5
SHA51274a538bc1125da1224a49d27f8894ca80053909993aec2e92d9e029cc639f5aa6e54d408159dd40cefc9205e2a855834d4b4137c0428555926f7ee4a1b747b6e