Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 13:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe
-
Size
179KB
-
MD5
3e3fdd5c9eba65c58d45acf822b16b87
-
SHA1
616a4735529406aa7e47c17799ec2b84ec6bc23c
-
SHA256
1213557ca68812da445c3e1d7caeb68c1219bb7cfaa31db9e6e80c1380592fbe
-
SHA512
4613abbf1865dbf71eeb4359d23cca0883e5c6dcfcabf6b97356d53753ded64b6abd71530ed156b7f4c8ca26f8b83ef0da2da3ff19b5ca6997a8723616166761
-
SSDEEP
3072:JFVYMk5EvtCgERIsquXZ1iy7LiJQ+gIod7q1SJJmfVDfmcqvXqRu8a3:U+VeWE7r+gIohqQJg4cqPWM
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1712-19-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4152-20-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4152-21-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/4572-131-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4152-270-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4152-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1712-18-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1712-19-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4152-20-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4152-21-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/4572-131-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4152-270-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4152 wrote to memory of 1712 4152 JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe 84 PID 4152 wrote to memory of 1712 4152 JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe 84 PID 4152 wrote to memory of 1712 4152 JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe 84 PID 4152 wrote to memory of 4572 4152 JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe 96 PID 4152 wrote to memory of 4572 4152 JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe 96 PID 4152 wrote to memory of 4572 4152 JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe startC:\Program Files (x86)\LP\D04A\F88.exe%C:\Program Files (x86)\LP\D04A2⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe startC:\Users\Admin\AppData\Roaming\A7630\6F8D0.exe%C:\Users\Admin\AppData\Roaming\A76302⤵PID:4572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD57f9e8f7198f5808e2ec86ddec99f9348
SHA1e30eab6754822c1b0e8bb637462eac76617cd95c
SHA2560699287772cc07253711c5e77d6038c29df6e36907398dddf4e6bbe0b8128873
SHA5129ef95a709692da1e69e1b3757f7e21bc2fe2df1e834eae7bb99392521b191380a7371e71ec4d3596eaa467ac9b47936909edc3efa187bcdec0628ff24f10b401
-
Filesize
1KB
MD54d20ee21715a686b05b2b17592b66987
SHA18a97a5e64962ff02bce33cb87ab9221cae9bf952
SHA256814cd26cb489110dd8a29658ccfbe87d4897c64867cd1f7afdb2b8aad29e64a9
SHA5126b86311c5412fa215d9141897128447810a967cbde0e921590d4d00ac890221065078b79fa5f3735935c94babf1a7507114a318a53ba88fa1f01b5c83cd7e778
-
Filesize
897B
MD537ecef10841f4764b3cfaea07c471a21
SHA13825b0d022e48b34d069d4e283790993eeb071ec
SHA2568f3c90813466c53e75bc344772d21c90ae15a54bff5957855a4ee25b60c84ca1
SHA512eba5e42c8608f8a49d4dbf9012a4060078178d717b6d7c78e96ad74a350f4298bb691e6c3aab92fb962044169ea3f439d4a7c8fc6405be0b400c64a49f93e623
-
Filesize
1KB
MD5bffcb0d170a565e875989da7643f55f6
SHA1ba4a41e2e95f80a1136019d6bbc1f0948cccbf65
SHA256414d44ff68007bf81e90fe3aeeaae0f191f61ce5a7834b0ca2df240a4127a436
SHA5127d85700c3253a92456220752c9993d3bc323411f3bf57c6bc5a1b2bf81f8268b783a5a857fb65334d0e179d329975737cb154c47842d2d48f912948d3f96a49d