Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 10:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
-
Size
186KB
-
MD5
3b47e68af9c013c802c90b642f9550e8
-
SHA1
351f773a58ce9e6f77a7b9800f8799fd4f291a28
-
SHA256
155af7464372dfda614f0a840ce020d113b82193ed6269e05ffc169da6c10626
-
SHA512
27c62b9e557a7ed57c35cbe39a5ff8a5566206e223cf416d8aa563e0189b9a1fab2787ddf63a3f0281f6c1b2241d2e496389ca823cd798544d015f86b3b786d5
-
SSDEEP
3072:rLGJRkDBOxGI3Y7FGBjMu80ND0y44eRK0p/WthgL/onpml9aMejt8NW/KO169Pnf:rLGTkVOP3GFilDaR7BWDgL/Q4Tit8NWK
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2648-10-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1716-11-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1716-12-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2848-113-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1716-292-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral1/memory/1716-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2648-8-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2648-10-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1716-11-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1716-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2848-113-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1716-292-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2648 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 28 PID 1716 wrote to memory of 2648 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 28 PID 1716 wrote to memory of 2648 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 28 PID 1716 wrote to memory of 2648 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 28 PID 1716 wrote to memory of 2848 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 29 PID 1716 wrote to memory of 2848 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 29 PID 1716 wrote to memory of 2848 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 29 PID 1716 wrote to memory of 2848 1716 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Program Files (x86)\LP\26FD\C98.exe%C:\Program Files (x86)\LP\26FD2⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Users\Admin\AppData\Roaming\D7F81\DC526.exe%C:\Users\Admin\AppData\Roaming\D7F812⤵PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD556c2ec621b2bf58bd2e138ce15ea9de0
SHA16d61054b51d1beadfd22fe2dad2478c0e9805f36
SHA2560a91e07998fb92c907d6ceb239d843195ac4b848e52a7b9d52ed329c66b2a983
SHA512b7c25364677825c4612158f3b455ad9a0cd73fb66a1f2110419803ad578540fea348daa2bb89db248217e3f3233c8a6a284c04ce4cf45118f03394769917abc8
-
Filesize
300B
MD5ff0223cc604b9d0876b267339d78219f
SHA14a3955e65a0d0cda98b311f8d95b7dfc6bd91827
SHA256ab72ed74f8b0b065be2d2f4a805ee78ee89fe71d7a196a239f7cfd4b80263ab1
SHA512042a8b8c7c417824cf39e4ac5cd13cb73988aa8f28cf4b4e30cbe7d3720ae7db9d0ac4ce4aeccbae14ef28eba6ad7f33eef6bac64e3ff46afa87e8774ffc01ae
-
Filesize
1KB
MD50052be51884f951c80e78ad45fcd14c3
SHA138abc15934923c8faab1749b5555b970ad53cc22
SHA256db10735bd17730b5c976c5a1ea17116d6360e3e3851731b43bfc550b37b76b9e
SHA512ed2ea505ffe159f8eeac3e4b9bc04cb9f251ebfa49549a6f160f474b8eed6d23a327861a6f9fcc9c9cdc53b051343748b303b33c7fc424d620ca8c842efd01a7