Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 03:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe
-
Size
177KB
-
MD5
34ccb809ab57d6606df991ce278b99bf
-
SHA1
6b493627726192d069fa29ed3ebd8c55c9239073
-
SHA256
1310f06fb2af00b140391ac0085549ac36465194b3f50cd2aacf6d5a1c889f02
-
SHA512
7d0934e9a55af82e4532a927fadb55512c01cda8a3c032d49132fee0143415280089d48bf76170d30476a32484dd6e67b691cf230dbe5509d2e1bd98cd81c971
-
SSDEEP
3072:pHNcIPMhL3li1h0FQzZdrhoslmqCt7Hzh8Ovr9pYPaQqn24f7OMcg:ptdPMZChuQldh/BCxek92
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2748-13-0x0000000000400000-0x0000000000456000-memory.dmp family_cycbot behavioral1/memory/3048-14-0x0000000000400000-0x0000000000453000-memory.dmp family_cycbot behavioral1/memory/3048-15-0x0000000000400000-0x0000000000456000-memory.dmp family_cycbot behavioral1/memory/2888-79-0x0000000000400000-0x0000000000456000-memory.dmp family_cycbot behavioral1/memory/3048-142-0x0000000000400000-0x0000000000456000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3048-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2748-11-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2748-13-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/3048-14-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/3048-15-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2888-79-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2888-138-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/3048-142-0x0000000000400000-0x0000000000456000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2748 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 30 PID 3048 wrote to memory of 2748 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 30 PID 3048 wrote to memory of 2748 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 30 PID 3048 wrote to memory of 2748 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 30 PID 3048 wrote to memory of 2888 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 32 PID 3048 wrote to memory of 2888 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 32 PID 3048 wrote to memory of 2888 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 32 PID 3048 wrote to memory of 2888 3048 JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe startC:\Program Files (x86)\LP\9FD4\CF5.exe%C:\Program Files (x86)\LP\9FD42⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34ccb809ab57d6606df991ce278b99bf.exe startC:\Users\Admin\AppData\Roaming\44A03\2169F.exe%C:\Users\Admin\AppData\Roaming\44A032⤵
- System Location Discovery: System Language Discovery
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD573fad17b1e59fe8ec9b15c172d21aad8
SHA172ecb3f0cc1cc158410945cad95d8dba817b29ba
SHA256bc553f90eae50e172d5aa6eadeeaa615e8379b17bb628c461e5e5e11fed5aae0
SHA512cf961e4619ca8206ca6d2352289bd774cff5606afc1f9c3f4dd480c8396e2fd65b9b21556f2bf60c3bffaf1e34da3ef4d50a40295a750b42f41c2c5d4f1ad046
-
Filesize
1KB
MD5d44fd36f822fc14f4a7f13bdc7902c30
SHA1a61876e9b069fa355b1b4554edfc8e3e0faab3e4
SHA256adaf83d5b173ac9776145b14a47a93f2451988e390f35d29cf441103c489422a
SHA51252e93cf42624ad02e90a7e9354bb742274a971768a23931c9cd6b5e27a31b2031eeee4dbfd7364979b0444d5ec09aa0d56335ab7096407f200b119c4d4e0872b