Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 03:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe
-
Size
181KB
-
MD5
69ae3dd9e7bc51521f66b59966707e71
-
SHA1
b416212cfa113dbe1cedb4662d5d499a0bfe59be
-
SHA256
4d9d332d9c5602748b89c2e21351e49727e24f2eff82dc3da935f305d872f036
-
SHA512
380fa9dee72f49559c197993f2048c4dbd94bf891bfc9eeaff5263a3cd97adb66408bbbcfece97856addd3990f3ee4f53d318dc1c5bfa5e43a25f435120c98c8
-
SSDEEP
3072:1K8xfvEkaMaftww3MVpkLXTr+ump60ccdXIraw3t:17f/aMafuyMVemNwCNIraw
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/2040-13-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/4072-14-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/1840-77-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral2/memory/4072-178-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4072-1-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/2040-12-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/2040-13-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4072-14-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/1840-75-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/1840-77-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4072-178-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4072 wrote to memory of 2040 4072 JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe 82 PID 4072 wrote to memory of 2040 4072 JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe 82 PID 4072 wrote to memory of 2040 4072 JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe 82 PID 4072 wrote to memory of 1840 4072 JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe 85 PID 4072 wrote to memory of 1840 4072 JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe 85 PID 4072 wrote to memory of 1840 4072 JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ae3dd9e7bc51521f66b59966707e71.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b5bc4ebfb086c30520030d6e1713ae0c
SHA166b246cf0700d307f836b963ea006c6d484aa62c
SHA256e09a446eed9b9c63ff62be02ab804716ca00c767e992347841b9f8cb19ddbbd4
SHA512c1f07be4e10337bacb811418cb30e5f469a25331fa6ecbe4edec978b955ad406f6071ad0513c54a5c337920bae17ef9ca7adba92d67ab468d47e3314282ae0fa
-
Filesize
600B
MD532b850b8e55e3262ba0e5d114deba005
SHA10a56075e036b09094bfd1f29bfe5b55e11dc659b
SHA2562570c64372d4978061d46bc36c8f090360468f0974c6ecec6d3f79db294dc351
SHA512d8aa7458cfde63beff3b5a12280763504654210313bc8d9ed57d816f2a1138e9c6562303c9b32c6eaaac4ba7cd677b41fae1e098c2e631016a9e456ce4e20ded
-
Filesize
996B
MD568057aaa046751d0a93a1bb0881749c5
SHA1a7860080fce446fbbb74eef43583ff505774b9de
SHA256f3eb9bc75f1934c46a15ffb5475ef72380cd411fb5bbd3a20b9993770a035936
SHA512ab74ae57ca61ed62181af34e161924cc23b0385d35f21dd72ba68c7b3884a9db3d983be4cf431be2a3f395dbff249373dc4bb476767f2f8b22c7e13579efb061