Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 12:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe
-
Size
187KB
-
MD5
5790b8365cafa2868f4fe4af4b90ed21
-
SHA1
52c2f9a4aef7bf8b7d700c631b148b14cbef59a6
-
SHA256
4e13b1d5ab5234f228658e47f7d02be93a172e01483bcc27c041516fd128b354
-
SHA512
1a58acc5f58fb233eefcc670a808b4284cb2d479312ed6557f32b6421b8d8e9cc3c8ed031c1252af3adf651667073e7d5d152dac532f884701136895752c67d9
-
SSDEEP
3072:7O/Rpeq71qplZ2+0wk3ilnB68X0YRNfBRdlQH03+7DFNEbS6LjamDlL6WS:7O/R9clZ2kiqNBRNfB5SPFSS63a8u
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2152-11-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1620-12-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2652-81-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1620-192-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1620-2-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2152-11-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1620-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2652-79-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2652-81-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1620-192-0x0000000000400000-0x0000000000452000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2152 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 30 PID 1620 wrote to memory of 2152 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 30 PID 1620 wrote to memory of 2152 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 30 PID 1620 wrote to memory of 2152 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 30 PID 1620 wrote to memory of 2652 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 32 PID 1620 wrote to memory of 2652 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 32 PID 1620 wrote to memory of 2652 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 32 PID 1620 wrote to memory of 2652 1620 JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe startC:\Program Files (x86)\Internet Explorer\D3AC\6C8.exe%C:\Program Files (x86)\Internet Explorer\D3AC2⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe startC:\Users\Admin\AppData\Roaming\C6A40\83ED3.exe%C:\Users\Admin\AppData\Roaming\C6A402⤵
- System Location Discovery: System Language Discovery
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD531401966a80eb3a47f79956c488de7de
SHA1262cf7b2e2f51f2bc4e59ab9be1fc603eb7ce9bf
SHA256f5bf851fb491a1ffc11d4658a3d0a7e169aa48a4a89196e74bb5477a8e25cb16
SHA5122967ac6bdf38f42a4326ce49d7aae187095e8f9c10ec7d8281f42fda791fb5a55dbfc9aede8c957c53d6fb64c9cd094e7666fa9e38f9706e1f3787ac5d5bd5ae
-
Filesize
1KB
MD5a20e3a5bb0ec7221b2644f8a4a428ac8
SHA1ebdd469aa7bee2365e9438761242566b6be59001
SHA2564e777da4c52a85841d290e731098e4f8022f879443c0bb10f463010c199a96ac
SHA5127c86934b750c2c5c73867a89e2f867af0da85ce3272782e0ab8d5d6fca6086e51bc352ed170f6bcc610f5dfd5e5430f9108c3c6395e1c19b2a192d4fea8e5cae
-
Filesize
996B
MD5939b60fe8d887d9f012a10fe16315827
SHA1ee8dba78bcbfa8bcbafcb5aa10de85e17d46739a
SHA256d70c3871324b171db2ba2f535ccb4ab17fc8296af9654df9abc76a41373be49a
SHA512d86bc70a961b1fdd5612b749faddb6f207fe587023c125d01a815e359cf3f1f9a15249518f2c97c35795392bf31001bb3c06d9efc198f38bd61dee9ddffb6346