Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 13:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe
-
Size
172KB
-
MD5
785483038efcd32b3be7758ad35ea82c
-
SHA1
0543845b921d1b4f34c26c730831f8a9732563b2
-
SHA256
106c9788b44d9566a95c7a2a273495fe20e60b4bca8e4b5f114763388d47dfe8
-
SHA512
9877dc7a8d8aea12b8253b60fbc629adbf52899bc682c150f73fc51f070ffc76413e52a22c18e2f9d6b860e0b5daa0d969b8de329e1edcd21a6b8eee0a6fadde
-
SSDEEP
3072:97p4RD9L54Gj+Zz/RKQq3niuwI0UD1U4w7ejvTYxD/PcLJWA:RS19yxVpKQ6z1U4w8TYxzH
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2736-13-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2876-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2924-79-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2876-80-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2876-187-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe -
resource yara_rule behavioral1/memory/2876-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2736-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2876-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2924-79-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2924-78-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2876-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2876-187-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2736 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 30 PID 2876 wrote to memory of 2736 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 30 PID 2876 wrote to memory of 2736 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 30 PID 2876 wrote to memory of 2736 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 30 PID 2876 wrote to memory of 2924 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 32 PID 2876 wrote to memory of 2924 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 32 PID 2876 wrote to memory of 2924 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 32 PID 2876 wrote to memory of 2924 2876 JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58bcaacea9669bdff7d485813428db217
SHA11cd94254b827a5999b14a31d8a0b8be530387dc4
SHA2569b2e06a5d23af1ac65f940949f97ef769a8a6d38ba32e13349653cc85bcd18a8
SHA51237dc2f7287dc1328a563817f8e43fd88d4b1b23cc2b5397ac0cf4ec952ecc9e36d193ebdcb0910d3fd453b72864515b6379f6f63ccaec3392f01194022ebec85
-
Filesize
600B
MD5235e2c89ebd20e9da22f46ac47fe9b6c
SHA13f9eb3afebb0125c331225b150fb7fab02b22eda
SHA2560ae96c17f2b24b121a69b775d226b8a85c7afef243b477f386951723a04faf5a
SHA512af5c3630ffabfb4e02cf8ee9407e82ec928165ffee2a32409e943938eeb6d836e4b8f3dcffe24db54068e229e2cdc72f245453864bf3dbc587b07f44b1a8a494
-
Filesize
996B
MD5b6b4d8681fc61db8825672bad728ca18
SHA19e09dcd588f916eede8808d8fda5b999c16cb3c9
SHA256b3075f81f7451392149bd86b45b57a5223297652be879425c7addcdb1052db8e
SHA5121e51871fb52a62e44e5027881728a9e0d158d136c3d73b7a43a7722e1266e94a70ac09bbe1506c0face2f80db60becff7f33c87172f332ff269ad9dfe8234e44