Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 14:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3f42737f1251688be21161e5c3257552.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3f42737f1251688be21161e5c3257552.exe
-
Size
189KB
-
MD5
3f42737f1251688be21161e5c3257552
-
SHA1
4882cf826953c6aa1f3bf01119bb7a498ec662b9
-
SHA256
295db97f63e0989f1702f576242b601950c26fe0d40c21571102bd22b2cf9b3c
-
SHA512
cd453396acd576136b75d30cb027721abebf2d7721d23b92f043362490633792b4b6eb62b1082c94b388343c8f4f8c3a07f376e2c01543c2874b7c67db7cc8d2
-
SSDEEP
3072:ZdwTJAxGf89jWR+9j+ur6jIuSMx4GdXM+msPEErSiMjULpKFXeylX1/yKhJAKulh:gTJAxw81WAXuneGFM/sMEeH8pK5NVyKM
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1588-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2156-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2156-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2968-85-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2156-184-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2156-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1588-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1588-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2156-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2156-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2968-85-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2156-184-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3f42737f1251688be21161e5c3257552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3f42737f1251688be21161e5c3257552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3f42737f1251688be21161e5c3257552.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1588 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 30 PID 2156 wrote to memory of 1588 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 30 PID 2156 wrote to memory of 1588 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 30 PID 2156 wrote to memory of 1588 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 30 PID 2156 wrote to memory of 2968 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 32 PID 2156 wrote to memory of 2968 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 32 PID 2156 wrote to memory of 2968 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 32 PID 2156 wrote to memory of 2968 2156 JaffaCakes118_3f42737f1251688be21161e5c3257552.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f42737f1251688be21161e5c3257552.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f42737f1251688be21161e5c3257552.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f42737f1251688be21161e5c3257552.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f42737f1251688be21161e5c3257552.exe startC:\Program Files (x86)\LP\536C\A95.exe%C:\Program Files (x86)\LP\536C2⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f42737f1251688be21161e5c3257552.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f42737f1251688be21161e5c3257552.exe startC:\Users\Admin\AppData\Roaming\CBF24\B0E53.exe%C:\Users\Admin\AppData\Roaming\CBF242⤵
- System Location Discovery: System Language Discovery
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD599e8044c8e258612ef02ab9ff72b9b45
SHA15d9e550b033d0ecd0efa9f9f3b251a33e6ca2542
SHA25633c2f89646012f7665bd62a735d2087826c527efcbefff40dd360aeb0d21a183
SHA512674ddc04c34c85e8403833836c9e52f48946a168e5604a00790d5cad5406b2752933e9c8d32872c7e965d0299b0e710e7730e461400119e0f82f44422178eb67
-
Filesize
600B
MD5547324147a21667d3ee7c0e50dd10a0a
SHA1e5010d6850807c4489f3f85c58ecfda9303d9c15
SHA256180a54f7a14209ee7b88457c75585aeaf29bf5829dcb66165de0fe20eeff28b8
SHA512c86363967e94cbc9ae31a25d9c8766dde5e159ac02ac41a70e82dace754af288a03707d095b1878e1b590db682fbc11f2c2de48dc20e4ded95813ded9120a4ec
-
Filesize
996B
MD516ddc511c9048a44d44b32ed6b94968f
SHA199973345084b5abe8eb7059f7501b1c26f4da608
SHA2563f5247482b874d0104db099fb55ddb9c448d4310956df8caa87c6024dc6d5084
SHA512285efa74afd7deae238074d1e8f5ac22bcadbca769a306284926b6875e2c8ad4aa7f0298cffb675aa0283a45864c362dafe9f8491e5661beaf6e4d70daefac5f