Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 01:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe
-
Size
172KB
-
MD5
67586c09ab6e5c7f83119ba6ace7682b
-
SHA1
0f87f9b6fb52dad6a4abaa5ce512901b82f36bef
-
SHA256
6e445946a7c007df4ca43d3a06b030a4ca0087b1c7fe58dc3ba4788c36542e02
-
SHA512
58abbe71146eec681092d8f2c3ec015e3f5b3f7791effceefd6b254a22c471eff9d6ef0fcf9126730b609e38e036d679e1c424de7c9934bbe0b432e15af109d5
-
SSDEEP
3072:Gc0lKMkRoOsxvEbZa7vCEz8ukZ9qVRl2dcYxd+R5LHjoJa9vnWvco:X0AB7uqEguRVXAhxd+R5bV9vWvP
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2404-5-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/2120-12-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/2160-74-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/2120-75-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/2120-168-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot behavioral1/memory/2120-207-0x0000000000400000-0x0000000000441000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe -
resource yara_rule behavioral1/memory/2120-2-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2404-5-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2120-12-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2160-72-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2160-74-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2120-75-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2120-168-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2120-207-0x0000000000400000-0x0000000000441000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2404 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 30 PID 2120 wrote to memory of 2404 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 30 PID 2120 wrote to memory of 2404 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 30 PID 2120 wrote to memory of 2404 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 30 PID 2120 wrote to memory of 2160 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 33 PID 2120 wrote to memory of 2160 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 33 PID 2120 wrote to memory of 2160 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 33 PID 2120 wrote to memory of 2160 2120 JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67586c09ab6e5c7f83119ba6ace7682b.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51e9126bd6660e69c1db900ff30175971
SHA1b043cc7e64a5ab5b66126107e05ed350129b7fd5
SHA2562a87a47963dbcab442cb8c5c3a0615cc45d9534ecd334666ec352f4632d955c6
SHA5125bc61b6bf79d1e8b188938725363b9f93c7631fb319ad2476dce6fd78219c2554b71fe73781436b2aec59d4cca2df5bd1684acabcaa2f0fdc6713de15336eb3f
-
Filesize
600B
MD54a25d7e40cbe02726da642297a8cfc4f
SHA1c4e3f332604f32910244d9fb1abcc2541d6532e9
SHA25608cc3ecc66b03b3ec663e79b36ae28127eb2b10a287d3630bc16d40719e926bd
SHA5128eb0a3bf0f0c2e9a5a5ee57679317fdb864bf1236d86f73999b3d131a03527d71c75d7a8f4abb0014bae499c88c86d27efce1ba64f52e693969343f833731a55
-
Filesize
996B
MD5257f051bd478da891dc564db4f1f0430
SHA1334538badb81d51126d978882bb7e8eae1f148b7
SHA256c1cd2ef91224ab8ccf2b253fb8c4d1821f6d600ce50f26018dc277efcce2a182
SHA51220da866af983514791c41100b6412418992f9036f1217aab35c610684f824da9b18a9d61daa4ddf75e954fa7389bd476d8715293646d311a1321bd3eed6bfda5