Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 20:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe
-
Size
161KB
-
MD5
44d76a8755e23030c5594366efc323e6
-
SHA1
ef591b1959c1387d4c08957f3b832a6cace66938
-
SHA256
4e78b2fae539e3e9ed7fc2b755be1b590c3dc2891ee7011a44f8fbf23e6ec2d1
-
SHA512
29cc520d2da1a179ed84fcbbd82477903957d39e181422916a8dff77bdb35cb201112b54c28058c98192bc3621ad6a0e8f0c2e2418151c6d1a1e4562a25e03c7
-
SSDEEP
3072:kojx9B/pFtWUL2bICrLBT48/KQ3gr81sRUTYa0BkZg9EzpAdSuPY32nVutG1lZNv:koV9B/pFtWi2bICrLBs8/KQK/ZzkWezm
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2288-8-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2848-16-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/1960-88-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2848-89-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2848-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2288-5-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2288-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2288-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-16-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1960-88-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-89-0x0000000000400000-0x0000000000468000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2288 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 31 PID 2848 wrote to memory of 2288 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 31 PID 2848 wrote to memory of 2288 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 31 PID 2848 wrote to memory of 2288 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 31 PID 2848 wrote to memory of 1960 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 33 PID 2848 wrote to memory of 1960 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 33 PID 2848 wrote to memory of 1960 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 33 PID 2848 wrote to memory of 1960 2848 JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5637bf43325ceafa1e8da07bf8b8d30ee
SHA1a251324b7ed1bd01f753d4471c9c47cba8809310
SHA25669fd9d0fe28e251c80277c7f96fd90e996d6103e90604397e5d58f75432e5813
SHA5120c7058ebe8d29870c255885400acd5ee6fa0e4284e5d3202aaaa3906dc1992743417606a785f049b3a68b537df5f2d5ca4a70ee61a325a948ee95b7c7be08385
-
Filesize
600B
MD57e87dc7dae4bb7de7c30a9ac5b52953e
SHA1880e9867afdfd193b50a86f96baf170a8c3d5e1c
SHA256490d7518f503edf094228ecc7645498cf8e61a7817a43fc6ac69071417359ea9
SHA512a5112c4ef11c364d0859fa84f9a85dfdb274215268113eef579fefe842112850e602b07fa6467bed4171833872389f45ee6b0e1da29443f2459d7e40e32f9fa9
-
Filesize
996B
MD57c0f091b828c4e136ef38e8b0e90b38d
SHA1d049b7c45c1006318556b9e0212078f85313a46a
SHA2564d38dbe5b3e0069dd6d4e57e58ceb58963d4f03aed730d9477b6b9a7b0487d19
SHA51272399e3ee9a2e1e0c4ba1bbe06dc1473838881ed693688c935226051f3270e7873fb35198c29b515404f7858ea793d762bb40b1877b8bc8a36c57af0d489b907