Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 06:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe
-
Size
179KB
-
MD5
6d74c235347b5f83a7b13bf7b275d5e6
-
SHA1
fcc82804a1e07046d7bdb711d4d660127c345198
-
SHA256
6fd5c226c072a18de4ffe3b5a710ccdc5769424eaabbead00797c541810191c4
-
SHA512
ff6facb702463230f8c9bf0ca5dc63037eb3f0343a162290d5b6478918c9380a63407a37a68c1738779664418e77748838d21373f900918fb6be482d4a64e6c3
-
SSDEEP
3072:AGQ26L9uXV49MzbmHdi4QTHzklkzAYATwAl8OzJ37FBc+kxtQJv+qvDWEY2aySfj:ZNg9uXV49MOFqHz2gAzT78Oz97FBDkxc
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2804-8-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2804-7-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2484-15-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2484-16-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1968-84-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2484-209-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2484-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2804-5-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2804-8-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2804-7-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2484-15-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2484-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1968-82-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1968-84-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2484-209-0x0000000000400000-0x0000000000469000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2804 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 30 PID 2484 wrote to memory of 2804 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 30 PID 2484 wrote to memory of 2804 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 30 PID 2484 wrote to memory of 2804 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 30 PID 2484 wrote to memory of 1968 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 33 PID 2484 wrote to memory of 1968 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 33 PID 2484 wrote to memory of 1968 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 33 PID 2484 wrote to memory of 1968 2484 JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d74c235347b5f83a7b13bf7b275d5e6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58fdcf1492870e5aaf8e7f07c3c956e05
SHA1bc1339f526515ff95284be1c7964b038f64af387
SHA25623843f23dc9910754551701d405849480cc8c76ec1688b4977f026ac5621ab6e
SHA51205c5542c59e89800f95df781aef52417995b26e05b212170c410a607b620c80ac26b9ad8a0b43d88fbdb212612317e9b33a1fd10d9dc1de84d0a373f2a213526
-
Filesize
600B
MD59c2872a4f3fe5a814d8c24801f43e924
SHA163a826c2202351787c12224b44633a91ecd2a05f
SHA256f5900fdda465402e5ef80caab187e3a1a499c2c65dd51357f21855f1b68b2ba7
SHA51252ae242c03f0c5c31afd82bb94f84970a3bc744b68eb1760174489a743a3ecac1376002088dcdb987caa65da8c079f08b6fa30ec8f3fd55af50f650697ed3c35
-
Filesize
996B
MD5908c37c2a6e4beba48a51703071b6298
SHA1a1f22908f4cfa02388348c8ac2fac5fad3321ec3
SHA256e68d572e0b8316c3cc68afaf1180daeeafba2f1272efe7f5c7e62dc2effcf791
SHA512b32d16ea78b9fe733871ede459231135c86ffe86ea3489c2905a7a14038478c1de983a8bd6563c87097055b663307624472d7f5b104d9e761b5f99687aa948e7