Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 03:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe
-
Size
185KB
-
MD5
69d940b56984523d3a925fed11a815d7
-
SHA1
1a50ba4a4c814b38f0044ef22131f549083f22f6
-
SHA256
6bdca351c24268bcb1f5d4a77110a3a784f7457a14ca10d55193c53c74849495
-
SHA512
9cb4a4d9ee82cdb57cbc5cfeadd46149b69e1ea237d9085d3271c1a14e5b2ffe68b2322b40a9b84e05dc913084bf181139b770dd694d3700323f8d2b605c872f
-
SSDEEP
3072:YsTu51gCPP9FJ8Nitr8YDyoM9fXR4tKH9meeeAL26aLxxQAN4KVFLkO9V6:YsTu5r9oNkwz1fXR0kme7AaRlbeKPkOH
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2104-13-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1860-14-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1860-73-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2084-75-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1860-184-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe -
resource yara_rule behavioral1/memory/1860-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2104-12-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2104-13-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1860-14-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1860-73-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2084-75-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1860-184-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2104 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 30 PID 1860 wrote to memory of 2104 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 30 PID 1860 wrote to memory of 2104 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 30 PID 1860 wrote to memory of 2104 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 30 PID 1860 wrote to memory of 2084 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 33 PID 1860 wrote to memory of 2084 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 33 PID 1860 wrote to memory of 2084 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 33 PID 1860 wrote to memory of 2084 1860 JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69d940b56984523d3a925fed11a815d7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69d940b56984523d3a925fed11a815d7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69d940b56984523d3a925fed11a815d7.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b36c33cfeefca588e227b005786dab9a
SHA1d2b3466e1d61c87e07c4670a289a12228511398d
SHA2565824f776dcd1fa0c22ce39a2612764c597198c71ed54eb40241d97153a257851
SHA5128d56cf2082df3d47150e0d23264c8825f94ae01bbd2455782cdf749b5a7fb732b6a0b7750204163546138622c9e9ee7c2d3cae8150e83d9719489b77b0422176
-
Filesize
600B
MD5d92c5eccffa619cca287f171bcd20391
SHA1048599af748e35b5356a2c19e0373308c445e8af
SHA256743353655631fd857568abd494b4ddb8c5216dd046161eadc0e8beae81f1f781
SHA512bf134486a2414bb3bb9697e51f927e614136bc8d49d01a4c89b6e5115072b9f0ab2c59dad1bc7d6b615a28730e1e99f7d598766d18b40b5775518836ba57efca
-
Filesize
996B
MD560752e5163fbd83b3424a8688c4dfb61
SHA13dfc0353ce8a2515cd84203a8a72bcf917f55c50
SHA256a3b3b02e40c4ae125af56b56072c66f54a3965977c02fb23cde08d35336c8f78
SHA512d8693325ec9a715a9f91fcc97d4d4a6a71b5dad48f77de1212115ccd439261b9abba6db5b0a467a5e64283e56ad0f1ce92b8ba0aaffd2f0beffb5db5c955e1b8