Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 01:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe
-
Size
171KB
-
MD5
49c246c901fe43763bb0d4b427af132a
-
SHA1
1ca81d7ff46a1c029b8174732be1b44e0c26a25c
-
SHA256
a3e1a94b736bc9d8c180747920b6700ef3dfe5764b920ec8798dd97055ab8f47
-
SHA512
16fcfad04965d4572f1cf517c5ac9e54b6bddd6999a1a1f2207f2b0aad5d8d47f4d6aedb595b1c2c915ef57c81d135f88d5500fcba69a224e1e579b198065049
-
SSDEEP
3072:DSl/g5OWnlF/ABgkKYOoJlAmrQIfO4lMMrbWV:uZgln7ABXKY3QqpHrb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/412-13-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral2/memory/5112-14-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral2/memory/2904-84-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral2/memory/5112-196-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/5112-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/412-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/5112-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2904-83-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2904-84-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/5112-196-0x0000000000400000-0x000000000046B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5112 wrote to memory of 412 5112 JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe 83 PID 5112 wrote to memory of 412 5112 JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe 83 PID 5112 wrote to memory of 412 5112 JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe 83 PID 5112 wrote to memory of 2904 5112 JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe 85 PID 5112 wrote to memory of 2904 5112 JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe 85 PID 5112 wrote to memory of 2904 5112 JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:412
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49c246c901fe43763bb0d4b427af132a.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52b3cb5f682fa36c66f95af9a96f15d89
SHA146eee514f76955fad0d98e0bd1a96ed4939e666e
SHA2568e2eea70114b4b27f240b6a38f11911892119b4ef381de9b20b89c810225da5f
SHA5125145e0e8038b560fde596e60db66f9b55895ae61ac9799a427ed76dced9d11d9381cf6efb0ee5cee13c647d3edb8ae416903f1cf199b5a1b3f79654703ebb60f
-
Filesize
600B
MD5e3bc74d3bd9f1fe2a0ac53f9dd802a5e
SHA1e6651c946fe27232fda91dd6f845ebe5f361206d
SHA256477816a6b38bdee9df15da87020a65ded2c4fb177d81576b9bd8f6391b6afebf
SHA5121d12fb6d1820ccb8aa1069fa41a4abf0c015ae49ae1a8cc7cebafe310f1d35ff6cd9cbc086d326454080e0174a05ea9b00dc58f407bb593c693078f891963c3d
-
Filesize
996B
MD5fbc7433d26fe968b3fb3665a49f58c69
SHA1f9238b3542add7a28b846f8bbacac00181222709
SHA256c839cf3b7f9bb76ba28558ea38d45569db82ef7d2a9523810cb0889fe6721377
SHA512867bbeb2f55f66422bb22278c56f52ec3a61f94985a2d221c057d24b43446220d151aaec49e9365fc9e2407b1c6e6603f26582c449ed5254806f7c558e6109e8