Resubmissions
14-01-2025 10:44
250114-ms248swlby 10Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 10:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3bab17bae73d51937d86192224353760.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3bab17bae73d51937d86192224353760.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3bab17bae73d51937d86192224353760.exe
-
Size
181KB
-
MD5
3bab17bae73d51937d86192224353760
-
SHA1
783f30d5cb0de250e2e890c8d724f3a36a7381a6
-
SHA256
abf6cc22659591dff1a2f28165f18823ccd32254b77326915a50cc8a4386087a
-
SHA512
8b03ebfff64eff2cc4b7133ed749107b5458b3c8b7236ed7657550d2944fa7ea9985e026b459c9274b5ab093487cb231cdf9ff07696fb8bb04335cbb56626bf4
-
SSDEEP
3072:BWD4RpcT27bdga2te1cfA52U4er2NXCY2FInmw0ZRn7zUOGbEeoRA7uVNGc:0MXPeDE/qeramGmrjnUOGtO
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2448-14-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2448-15-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1976-16-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1088-98-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1976-215-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1976-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2448-14-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2448-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1976-16-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1088-98-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1088-96-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1976-215-0x0000000000400000-0x000000000046C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3bab17bae73d51937d86192224353760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3bab17bae73d51937d86192224353760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3bab17bae73d51937d86192224353760.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2448 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 30 PID 1976 wrote to memory of 2448 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 30 PID 1976 wrote to memory of 2448 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 30 PID 1976 wrote to memory of 2448 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 30 PID 1976 wrote to memory of 1088 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 33 PID 1976 wrote to memory of 1088 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 33 PID 1976 wrote to memory of 1088 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 33 PID 1976 wrote to memory of 1088 1976 JaffaCakes118_3bab17bae73d51937d86192224353760.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bab17bae73d51937d86192224353760.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bab17bae73d51937d86192224353760.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bab17bae73d51937d86192224353760.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bab17bae73d51937d86192224353760.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bab17bae73d51937d86192224353760.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bab17bae73d51937d86192224353760.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5055495a7e4e695ed68322058000873c1
SHA1462649c89f2d7e202546b2e3438fa7717ef559e9
SHA256d60f3e434e7fb832d75038c03bd5fc10f50fb7744f8fd2ed319979968fd117d2
SHA5126896f229814b4676e9ef29fa9fdc791d5d3e6ea18d08fdccf8e100c526d2d0da5b2bfedcf8a04f147dd0eb7b6f973ff9cd5a80234d826c13a0f54ceec4ba7224
-
Filesize
600B
MD5c395e4045dd3d652ed4ebd94f0a91e5e
SHA186f176cca7183c61e706224524c0fccf6625b677
SHA2568076aea62f52fba4af1531b7b27443f3ee93fe8874684e87505bce2daeebec76
SHA512aeba55b830240e1853638cedc1afc1b67ab19f04efc10a335c627566ccfdffe4f4031fed523d731d3413ee0ae2d76590e2e92e9aed532fb3237827347c1445af
-
Filesize
996B
MD5f92afd394687a7f553a249c5c4c4db6e
SHA151614ec69ec82687445289dbe5a2860d1920981f
SHA256ec9e6e5fa95439eee78546415f4b39cc1895a4b5f43c0aa31d13a55b445c1140
SHA5123ec839a9791f04b2029c7cf6472f16e0e17f9db4c20873869a36f5a151635bef2fb4e5dcb8546d9e18c9ba16fc918c0a48462b1fd3413b789a3e103dcdca1176