Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 10:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
-
Size
186KB
-
MD5
3b47e68af9c013c802c90b642f9550e8
-
SHA1
351f773a58ce9e6f77a7b9800f8799fd4f291a28
-
SHA256
155af7464372dfda614f0a840ce020d113b82193ed6269e05ffc169da6c10626
-
SHA512
27c62b9e557a7ed57c35cbe39a5ff8a5566206e223cf416d8aa563e0189b9a1fab2787ddf63a3f0281f6c1b2241d2e496389ca823cd798544d015f86b3b786d5
-
SSDEEP
3072:rLGJRkDBOxGI3Y7FGBjMu80ND0y44eRK0p/WthgL/onpml9aMejt8NW/KO169Pnf:rLGTkVOP3GFilDaR7BWDgL/Q4Tit8NWK
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3964-10-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4524-11-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4524-12-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/1364-115-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4524-282-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4524-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3964-8-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3964-10-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4524-11-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4524-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/1364-113-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1364-115-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4524-282-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3964 4524 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 82 PID 4524 wrote to memory of 3964 4524 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 82 PID 4524 wrote to memory of 3964 4524 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 82 PID 4524 wrote to memory of 1364 4524 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 87 PID 4524 wrote to memory of 1364 4524 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 87 PID 4524 wrote to memory of 1364 4524 JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Program Files (x86)\LP\F0B6\5FB.exe%C:\Program Files (x86)\LP\F0B62⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Users\Admin\AppData\Roaming\6DCEC\447F0.exe%C:\Users\Admin\AppData\Roaming\6DCEC2⤵PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD542d897108f0969adce82ff8100f71b5b
SHA1e6e0546826a445ddd68c8b2f20e09b8fa085630a
SHA256d22577e342f066ab8e92037cc8158ecf5bbbf8a22e351c322e2a00c5fa1aaf21
SHA5121a02e9119262db425b8cfe462987b09c69299e6e1a233d5a0dab2dda6dd97848a719d5d285046d294670e98b7e93c10d4369d3b5ad40830648a07f9f21699e83
-
Filesize
300B
MD5d4c2d0f37239c923befb98ea13eac376
SHA1b385c2b271d354f06c739e9f8afbe7fa5187dad1
SHA256a4b7d70c693901e089c44c0f74f248e722c0a172a10c940f62f56be500ed548e
SHA5128a357472bb4e241c2d8872062c2fc087d07c37bff8e896456e9241b1f9d5ad8f022d49117ab07e5666bad4fb1b8de43e2d9e5edf3ed7f2b2020681c1477f64d9
-
Filesize
1KB
MD597f1f66f2e077e89e595a2947c958e38
SHA12d7f1012257ed08a7a0a202197ebafc539b51548
SHA256df16de923a083b841227f9018102d1512a52c22c40e6f31be5d1f20d1bec3ece
SHA512d7b92d27aae06e72bc6675b5599685b84e8ac9c77bc41a16038fc6af0ad64c3f2f3ad4336b25b5466b41a2514bf8ff74b8d3c43bfa01b763535d1c4c36512dea