Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 04:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe
-
Size
190KB
-
MD5
6a644eae0b126e463cb2bc9073c6e65d
-
SHA1
fbdad709780daff80eda4b366f8c11aed106eaea
-
SHA256
a612deba068d9ace26485c230da9e96d5fca0eec59adb905b4bf6f005c49bb5f
-
SHA512
8e612444fdb5ebbdbe45872817150a6398909e61d01314ec2ed3c1fd78dd1f5bf2963c6d691a3f90630b7c05667213e69c430d9338dc2e3bc443fd7847ff241c
-
SSDEEP
3072:7OMBdOLmzQRSnw9DA5pDmwxKrZ8xWlNIFUHlKEUVsHDzh9IQQWJ/ySDm67:7OMBsmzQRkw9DSmR8wlNImHobVRxE/y2
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1492-9-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2056-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2748-78-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2056-200-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2056-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1492-9-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2056-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2748-77-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2748-78-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2056-200-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1492 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 30 PID 2056 wrote to memory of 1492 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 30 PID 2056 wrote to memory of 1492 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 30 PID 2056 wrote to memory of 1492 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 30 PID 2056 wrote to memory of 2748 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 33 PID 2056 wrote to memory of 2748 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 33 PID 2056 wrote to memory of 2748 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 33 PID 2056 wrote to memory of 2748 2056 JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5210c9e73a1a3909dce7b384fee395404
SHA1f3a36af7cfaa9db006fdacede260269e27b1ffbb
SHA2561dec6b45ffb1543d1ee698c598f7bc9ab8748dc2c689e364526387c07193985c
SHA512800ae48b4488778646ae0854cdae4d38ce78fd0e678fbc20185c7641a49fe5335447e54b14c5bde4506a6fba250b396c7931b44d43a8bb2159bc8bbb96a4509c
-
Filesize
600B
MD57de41ccf2fb6ff32762cc815ac32d704
SHA12842f41a7702caf6c7be9d192ad4d06727d51a79
SHA2562baa3104fcf7e832fd7d2ad81568d8e610044987d0f833ba8965a7b4ab82f5bd
SHA512843bd6080129e5518222ddd749ae755c93a162d1dfe16fc37aceb9e2598065f55a709948e3b26169e45dcddfaff31a8bb4e406b181c63e346ba47d9ceb9c5256
-
Filesize
996B
MD5515562135adfb391acd7ec41504ab205
SHA1844a7e966d96de3f2970431695785b7d82446e33
SHA2563550e24489c2360cdd22ce0ee913e10fc100e66764f6da5b98fa8e9b6eb5661a
SHA5120dfe0d68c0ee87c46d4d4446dbbe51f125572ad181e97c60ab05bb59bcd1fee055d4ee334404a489c925bd24a280617a4a9141b7087c51d2b6738153aec6301b