Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 05:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe
-
Size
174KB
-
MD5
4ddf2d32df4ab6e4303bd28da8c448d9
-
SHA1
0fcbd43cb666585dfea3dc99fbba1a3b1fdc2199
-
SHA256
4fa3b1f6272e2ebdac3a1bc74b8073d2359d189a7ab636d5c42a315e313c4354
-
SHA512
5c72f0d353bbb5d6a7ca5444d8e97fb365efa148f13a12d879f7d0c04b20a1cabaf638d20fa741b6997f9902710677954da333895ac5eefac38ae45ef6327823
-
SSDEEP
3072:ZVspm8VFP37ODudlEZCQOtBYwJHqB/f4EHZSIwn05ZkPpw5wMDfKsSf:ZKjkuJQO1J03tdrPwMzbSf
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2640-6-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1080-14-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1612-84-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1080-200-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1080-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2640-5-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2640-6-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1080-14-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1612-83-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1612-84-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1080-200-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2640 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 31 PID 1080 wrote to memory of 2640 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 31 PID 1080 wrote to memory of 2640 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 31 PID 1080 wrote to memory of 2640 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 31 PID 1080 wrote to memory of 1612 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 33 PID 1080 wrote to memory of 1612 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 33 PID 1080 wrote to memory of 1612 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 33 PID 1080 wrote to memory of 1612 1080 JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d3ab1390dc6bba16c956a3daed9c2ff1
SHA163a9bd4ea7a4d6e01ebd2041f64d894887183d22
SHA2564c11418798defbf5e8a4197bd5a1cbb19c27e25f11fb34e67d1c408eb50c32de
SHA5129992062f0d2aa7f45e49e2b90265dec7857a27f0190f25dcac6921c230b0067af016555d4a15d6fb23f7229fda3e751d29992a4fe4c42a76d6a4c7e3617e05ad
-
Filesize
600B
MD57939983b8c3f13f457e7f7d1c927180f
SHA1e327df8ec11f50b0704d6322604ac13b65605bad
SHA256acaa25fa90f8c0171509263472a2c3fb561b7a0f0f5e9e5abb047bb7de96fa35
SHA512e6f5dd2f376606aedb8cab73077f0221cfeebc0bf05b759888a226c05363fde82a841b5027555b50495a47956a8d69fa77141fc2b53c228e3e54e576a4b45e74
-
Filesize
996B
MD533a41df8d1786b704479577ae862d717
SHA1463c7b9f59aa0f28dff2f434efed48b646548758
SHA256f3ba50fda409543f90df9f805eec4a5aaa1ffa62e60ba677eefdd3211eccf97e
SHA512c1e146f1c5c245a57d6ed2918529335e5b0e8f1cc89dbe55bfc504e9ce5f045c17a006641243820fa3f06799fd0d7ded8b745b421066365e4f14c680ccf4a335