Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 00:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe
-
Size
172KB
-
MD5
48c15e2fa6716f40bbe47d31106d7767
-
SHA1
abd8edafa983c34dbf7961a96106fecbcd603dda
-
SHA256
ae81fee6aa8eb428f282471db50b348b22f0f399d5e9c97a6721f74ad6788b46
-
SHA512
7e35e63e71f06a5d2ba0e42f9b800e67fa12c9a7a1ed186d83a733b53b18420b9c410d9b218e76618a6ca50269274fc14d879aa6abf5cd92a44c44880614b73d
-
SSDEEP
3072:29OqKsgTwk7/5ePtqWIwIax1xEyhUGRjTc2A+WgoW+QxZiFpO2Q2D6:dbwU0cWIPaDxThUKTAcv+QxZi3G
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/5056-13-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/4592-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/1128-77-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/4592-138-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral2/memory/4592-188-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe -
resource yara_rule behavioral2/memory/4592-1-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/5056-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/5056-11-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/5056-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4592-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1128-76-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1128-77-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4592-138-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4592-188-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4592 wrote to memory of 5056 4592 JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe 82 PID 4592 wrote to memory of 5056 4592 JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe 82 PID 4592 wrote to memory of 5056 4592 JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe 82 PID 4592 wrote to memory of 1128 4592 JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe 83 PID 4592 wrote to memory of 1128 4592 JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe 83 PID 4592 wrote to memory of 1128 4592 JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48c15e2fa6716f40bbe47d31106d7767.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52759973a2e11dc0dc7c5d166948e6c0c
SHA1b9e67439338b0c41c7c7ef7486495536bd20993e
SHA256ca2b1a11714eb0d38e3cc859d9b6e5a8599c325b8b4cd16ecb223c7e1074d10f
SHA512228103e3360d0809776bd16d9980db80413f09831e1eb1c7ce708334f1900f8cbd79281e2975673dc2a5bfe0e9633d98fc7dfe0aae6433b28e50884ef7201466
-
Filesize
600B
MD5cd4da2c071194e4ecbefacef5aeb0665
SHA1ab499001fe6c67a8091b1ddd9a78f46af38d2191
SHA2562af173bbcd0e4dc61ce359efe0d2d392ddef163ab25542e11c9bb579003d8d9c
SHA512d63b02f48519441d0d91c43fa8873f49fb3e59357ebd168d2abbc97d9da541f313801e79fa55648c52bba6ce89ba0afb7e3bb4f42193bc2a292967a229259918
-
Filesize
996B
MD55f63135edaaacd66831d28f23be67875
SHA1c2319d33e11ebf3afc7995fc47b542e9aa81e983
SHA2568d3a100ecf45cd4d5a1e501d1a4accbe679e44396d97cb8bad4bdc954ea0becb
SHA512e6c14dcbade17d40f93fc088db37ef6a0cecc920ee2cf6121c0697600f776e1719dc438681b339bf3b8f62ecd106587bec8b2313368aa956be38275bf0dd980c