Analysis
-
max time kernel
140s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 04:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe
-
Size
188KB
-
MD5
6b0b3dd56fab03cde50f1e5f0ef83a8a
-
SHA1
cf621596ee2595ae6ad39cb630462e50d08716f1
-
SHA256
4e644b128a71282f5b8fb048f76bad571129bc8001a38ac5aafab1043fd69e3d
-
SHA512
b6115da8239eadd71ffa68cbaf90104521a0a95ceeeb67ccdd77cb831de8b42457f67488508ff51615b345574032cac4e021c919b8360d04af0522db71252662
-
SSDEEP
3072:VOYG9vqBBZM3F7zFetXw6ttCPFs7toHBK7g7v6On6:VOYoaBZERUgktCK54GgW
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2152-6-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2376-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2308-80-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2376-81-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2376-187-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe -
resource yara_rule behavioral1/memory/2376-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2152-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2152-6-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2376-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2308-79-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2308-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2376-81-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2376-187-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2152 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 30 PID 2376 wrote to memory of 2152 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 30 PID 2376 wrote to memory of 2152 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 30 PID 2376 wrote to memory of 2152 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 30 PID 2376 wrote to memory of 2308 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 32 PID 2376 wrote to memory of 2308 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 32 PID 2376 wrote to memory of 2308 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 32 PID 2376 wrote to memory of 2308 2376 JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b0b3dd56fab03cde50f1e5f0ef83a8a.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ea4cefd9f2abe811af4a29bf41455bcd
SHA1b22032d7b95211212616e04d0113364a32c7fe8b
SHA2566fdd996be466a7f0badc7956b8b561858576c23dda20de78e92e3b0a4893254c
SHA5125a8dc7b219c1383b2da01c0a789bb944b3bab93a192d50e5bab070ed29fca37ddaff5a00da7a4ca94125bbbc0ac35295f5261780aa61f2346f1ae9d6c93db637
-
Filesize
600B
MD51fb1163084b702b0932463139392890c
SHA1592b711488901122eecd948115abfcd4cf99779e
SHA256c73dc44f0c434ec54e8b285bffd38ba1c84c44ccf9cd82459c11558cedfe93f0
SHA5127e3fd3d88a8feb4713698a7b403362b791fcc37fd218d9969e9ba48f612aebfeef57906c2f3f95a315fa9ae2a39f612e79510f8b6d6a5aca426a0b8434ffdf57
-
Filesize
996B
MD5a56c89b25f4bfb19dd5f5a016211be54
SHA19871510e8ea443fb534fc7cb34ab7f1fb0e3f6ab
SHA2560489ea669a23a8b46c5b9dac4766a04d38d4fbf84b9f367f19a28ecac14d6277
SHA512c8670c65390fae4eed515d68b256b0909caba237c0c37a1984a96f69faca738b6ac6a27b8dfcd7ca30c18870505d4077d95591ad1197a4a608c01c3902903ab5