Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 00:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe
-
Size
180KB
-
MD5
4842c8ae27f9c502819b7d42f394c951
-
SHA1
226e043c423a6e034b7b2b7226abd0b22befa089
-
SHA256
1971545ba21f8cac97d3bedce32dacd9b927c2350e9354b507d41a7b0cfe8ea6
-
SHA512
c6edadf55617ce22fff8a68f15e230d5f638c5458130242826709cd925ab69142f2c5a42b1228ef3f3d254395109e3cc1a4abb30a48552d40d3da9f3f2d217ca
-
SSDEEP
3072:mbBSuGE8WzfzV6blPg1FrFJcYxS+WozLPleMCwtfhlAPw9dwfi0D:MGERHVNDFGYx3RLPl/CwtfhlAUdwa
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2392-11-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2488-12-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1968-126-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2488-297-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2392-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2488-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1968-126-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2488-297-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2392 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 30 PID 2488 wrote to memory of 2392 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 30 PID 2488 wrote to memory of 2392 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 30 PID 2488 wrote to memory of 2392 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 30 PID 2488 wrote to memory of 1968 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 33 PID 2488 wrote to memory of 1968 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 33 PID 2488 wrote to memory of 1968 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 33 PID 2488 wrote to memory of 1968 2488 JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe startC:\Program Files (x86)\LP\4673\9FB.exe%C:\Program Files (x86)\LP\46732⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe startC:\Users\Admin\AppData\Roaming\3E8DA\4FA46.exe%C:\Users\Admin\AppData\Roaming\3E8DA2⤵
- System Location Discovery: System Language Discovery
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5816ed91432f66e96800109c15973d4ad
SHA128a3c946ccc58e41ab55971f82797ff65f53ab1b
SHA256e4e32b11d0a204cac1e270f9f4c8b342d10968a9e5ab9e90bc7629c9ca87b841
SHA51241b56e25a393b758f7e3a25c9cc2bc4033f96277593a21776033f9bfda70d6b67ab216b6b40953ce6aa4e3da98c560a9c85b3412ca09032d641bdbdbe1207404
-
Filesize
600B
MD5a47aa983190034306573b2f8d3561ec3
SHA124a7b4d8e9b5dad073b8a8693dcec82d0219b6c8
SHA256185c990fbc7efd049fa73f2a1d9c2e0c9c9da4c7dc707fb07703623c0597a65f
SHA51262000240988ac95cb0092d63056f159ee4177c5965f28368e9c8be86b3242aa0de529ca77cac953e3a73ed926bc1c3c6a409ff5166f6be82eb593362143eee87
-
Filesize
1KB
MD5e5f2f175b6595a478ddb1613109fdef9
SHA1240e579a87c0438fd48043f28c5588879c283570
SHA256ce8ef62cb24647147df51feca5354f9285ca97e3b8678244579029e9dfc2a531
SHA5120e5a487d2d5d53e26a6838b404ba9c0e9eeac0117df32f30279b133a8a40b2702b75c3aca1b1f04e2fe37177104539281e56706b3daa25a229e573e2a64f5135