Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 05:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe
-
Size
179KB
-
MD5
6cda8b56c8cdb26667912f50a234258f
-
SHA1
a46a2d98553482ef729be3cfbfc4366241304e3e
-
SHA256
711546c4a73e555d03231da10dc51251b561de9cf393facca4b3eac262b466f7
-
SHA512
8c3e7e417edab76045406772ecf5bc9a4c7be37bb3765cb41a4be5e9d1e7a073dd2c1e3aaa15e481b400488ec50904deb5b8eb810ae1f23fd13c34e2317c971b
-
SSDEEP
3072:k0FXNJPY9XjMnklHpMNDWsia4P9Vz8Aji8zVg5zGFcti19D/WcWKEmzr9c:k0lPwNjMnklmWNa4f8AjiKS5qF4i19jK
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2240-14-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2384-15-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2384-80-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/1288-84-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2384-185-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe -
resource yara_rule behavioral1/memory/2384-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2240-12-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2240-14-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2384-15-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2384-80-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1288-84-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1288-82-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2384-185-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2240 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 30 PID 2384 wrote to memory of 2240 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 30 PID 2384 wrote to memory of 2240 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 30 PID 2384 wrote to memory of 2240 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 30 PID 2384 wrote to memory of 1288 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 33 PID 2384 wrote to memory of 1288 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 33 PID 2384 wrote to memory of 1288 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 33 PID 2384 wrote to memory of 1288 2384 JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cda8b56c8cdb26667912f50a234258f.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5858fdd55b2b2201bbbf2c28a8cc47614
SHA16ecc2a81af3ce902bf295bba4b2b3ffa55d2bc23
SHA256e5768c9f5d1c7d03d4c9d9c4daee59957e7c7ba418b1b35e56a0158baae43e37
SHA51246bf8fd2e655659de4e488a87d5e4c966fc75274138dd9a16e40a38b10c37c6269518e12e3d2941885cb4a0e045da0d5931fd8c59794da81ab650cb527973489
-
Filesize
600B
MD58110e0a90d09c7d23942490b5f12f84f
SHA1762d5a8a7a4824f045d4790e437c483304de6727
SHA2561e262cfb857c14fd50930a8f13bd764fef57f6dacdc21e094ea6b4bae3c7fe96
SHA51261385fbc5b389e628c5bb0673140fa7d674e6320547e0d933652f0ec9b72947fcd81c6d17173eaf901ddcc50c4007000375c1d0d7730e39314f5c79efd9b9bf3
-
Filesize
996B
MD54a26beab3fcb02ea5c7138953c4389dc
SHA15d9c54505512612e87162fe1624240cd8e11fbea
SHA25630486d7fffd0fa92b5433df75c10cd4825b3aebefdc48b0e62f5f06f50f1bba1
SHA51284dc9d7c0b764a4926ffd22740791b5828fb16e104ef0827ade57450b15b77ee808bf85a320bd7eea47a7bb1b48c68142a43b134533b64aad284ab6131ec81ba