Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 02:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe
-
Size
170KB
-
MD5
4a76a2529b7b37fd848ce17c6142453f
-
SHA1
a9d9e24ba0094ae6b8e68899604d67c6445efeee
-
SHA256
624a2696409f9e01e286dd43f06a98cf9653ef55175488869f94178c0dd9ffc5
-
SHA512
433774e9ff4535c20feb34c58191e2ebd1bc103ad98bef15c3c2a80309b753c66dc05d3c323864c93addb6ec1532c36072db111704a673bc6acb638c43dec361
-
SSDEEP
3072:Tg5GjiQSVa4RcLv9kv2o2SPZaFygQqRIJpp6c3/Qxxvq/lCRc7lCXl1obsXW:OKiQGa4R/2SPZaFG5Jp0clN21obL
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2652-8-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2124-16-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1040-80-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2124-191-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2124-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2124-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1040-80-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2124-191-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2652 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 30 PID 2124 wrote to memory of 2652 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 30 PID 2124 wrote to memory of 2652 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 30 PID 2124 wrote to memory of 2652 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 30 PID 2124 wrote to memory of 1040 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 32 PID 2124 wrote to memory of 1040 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 32 PID 2124 wrote to memory of 1040 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 32 PID 2124 wrote to memory of 1040 2124 JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a76a2529b7b37fd848ce17c6142453f.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58afbcbbd2a79afcb48d82f5f04ade830
SHA1c96e27445b75c5849350562da828bb6efe9875dc
SHA256b44a97dc27f8a7fe8fefb82a310caa70391993deb049de02d0ef3313cbfbada1
SHA512e01f71454d562196fee4a12384e668cec1d59faade3945a6d6383fbf7167e7aab0001bf83695c7a7a031604de902670186695c49030a258fc20d6413dc312369
-
Filesize
600B
MD5369f4b6d0bbfb914957e9fb5edeebdef
SHA1af0f9eabe29e04d3c1a2c98fccb7b730e78f784f
SHA25684af6665f66e342bca5745cb2805b9cdf157588367960e47f31360174e62e243
SHA512e1633851a686bee2a05eb52f6fac4e63e23859e14ddf50aa301e7f506dae433469dd8098ea9c629c40e84d7cc0e1b13d9721c9929cd3248ed6095979ecab09db
-
Filesize
996B
MD5bfbe5cb6bd44efbcb2b9743b347f5c84
SHA17fdaa9f3f5d6b2d9f699cb060512d146f12db871
SHA25642b94701cb23983681294a6963704bbca4e53a22d88732b6cdf7625d1cc468cb
SHA512255f995611b9beefde5315658338554c8df306f6e6fe9e7c6dbd0813f9c7cc2a9c58a5f5e3f4f686dcddff601c4b9b69581e890052fc720d4bcb2a5c652aa48e