Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 04:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe
-
Size
183KB
-
MD5
6a93bd44caa7387d8820ba4412f5ed67
-
SHA1
24d417b6f246d3f486a44321b6cb3b2b8a6882c6
-
SHA256
751c0ca76e4bae9f4d869d4aae22b374dffaef8f43abff58ee3e1945140c90d7
-
SHA512
c7dd8f142d916a02bb20a18c56100689de177185bc49f50ad7dab4189fc6e48cc0eb9c8359a3d3405579d51f15bde3e247be1d5bac647d33b09e4922124bb11c
-
SSDEEP
3072:d3rKTTJ3YQGhQTvjFtvF/57Bg+F4p8Hj7zRgu82PC6nlLkwKet4uRzSD5dYux4EO:RATqQGiTLFNFx7BhVz2J23LkwDOuOTYX
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2480-13-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2336-14-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/1404-90-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2336-163-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2480-13-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2480-12-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2336-2-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2336-14-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1404-89-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1404-90-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2336-163-0x0000000000400000-0x000000000044F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2480 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 30 PID 2336 wrote to memory of 2480 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 30 PID 2336 wrote to memory of 2480 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 30 PID 2336 wrote to memory of 2480 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 30 PID 2336 wrote to memory of 1404 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 32 PID 2336 wrote to memory of 1404 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 32 PID 2336 wrote to memory of 1404 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 32 PID 2336 wrote to memory of 1404 2336 JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5e1de5c6592cf3d41c56097b8c1c0fe72
SHA1d687f9c9b03ef5eeeedb2aa01255658cd8115245
SHA25686298a77d5aee0b6bba194cada8789f0ed02d6b77bc433a97ce3ab5ecf1d4bdc
SHA512c4d69315e4a70f2b2462623c03f1c67cd5fa4a5df002e02359965d26cf6f8271eec872dfb26475e3f7f1ba15c6ec70b268245f7bed8627d4a40e87360f39a358
-
Filesize
1KB
MD573454397f5dc7059d4d2fbd3b0680a10
SHA19ce688df3d5fb735d33b2c8f03f5e3f6de9a8a32
SHA256356ab23126a26c930db8e5f6918690d39af3886d83d8b8b8afb8ff82a334426c
SHA5129bcec2e8259fa6d6456edd5f9fd77aee23633771d640ea86bfc17415b7478ad9d66ce1f6863577d41a0cfeafa361335f853bb68a193ebefed8e10cc3977e502f
-
Filesize
996B
MD5f4276811f12f57d98d6e0267c632803f
SHA140e22bdd947b55a96fb53c8b65207634380183f9
SHA25677be75d5233e3a4d719e01140f8aad2770650a229c66c235b078d863b3530a91
SHA5120f578fdfbf5e4fff2450974170b042ec294fa4561c0b97d11ba6e67e8108a1a5c2d60ca4190c27128eaa41ff43eb2eec9d6c5af9c382497da036b694dc519cc5