Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 13:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe
-
Size
180KB
-
MD5
7854f659cee962818055d8e5e068acc4
-
SHA1
708cda3618bbe2d578750a24efac6e7bb07641d7
-
SHA256
2b9223e59fc80dac2e4d447b8059de000b87743985bb2e9aab8969305e729287
-
SHA512
ff116f195c4527d13f7368e9bfc2de08b083c722a8f9d0fa0ed131c0b21004050ef7d83f58f40facf676b1fa7ec01f21a89a333c9036b3d3ab841f091ff54a56
-
SSDEEP
3072:/vox12+nf24ert0IsrgQ8lIdGxblSHepOg6X7VLy7Oo2MXvQVxQUMrxsL9RlM2b:noxR2xZsUlIIzSOOg6X7VLk2MXvAxQUn
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1648-15-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1800-16-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1800-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/3000-115-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1800-290-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1800-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1648-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1648-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1800-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1800-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/3000-115-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1800-290-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1648 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 31 PID 1800 wrote to memory of 1648 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 31 PID 1800 wrote to memory of 1648 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 31 PID 1800 wrote to memory of 1648 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 31 PID 1800 wrote to memory of 3000 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 33 PID 1800 wrote to memory of 3000 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 33 PID 1800 wrote to memory of 3000 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 33 PID 1800 wrote to memory of 3000 1800 JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7854f659cee962818055d8e5e068acc4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe startC:\Program Files (x86)\LP\D052\18D.exe%C:\Program Files (x86)\LP\D0522⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7854f659cee962818055d8e5e068acc4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7854f659cee962818055d8e5e068acc4.exe startC:\Users\Admin\AppData\Roaming\2E90F\D97D0.exe%C:\Users\Admin\AppData\Roaming\2E90F2⤵PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5a0ca6dd424971b9780c6c0dbe49c236a
SHA1cc2f776e069f7fd7bff44b7a42293cfe8c16cbf2
SHA2567df61cc75a1ede2a3c8354be030d5f87cabc1e1b562087ee9daa39312868af55
SHA51228e70cfdbb57e6e4fefa658f1fc09d7f171e12f63e7d44cb92df293ba6320ae01ea8f6931b4047bc305075170810d77988c1e33b195242c04fbecacd855fcde6
-
Filesize
600B
MD5dfc26ca2787de42474a4623e08070e7e
SHA10ac91ed0768a1b38362f770a00e4a25c402d870a
SHA25659fdb92061b8a5d4a71236607a68cbb9f4b3d91edeb9012933c89177d11f7eaa
SHA51246c6f2fb07fe7abb9902a8134b4af91973e85bd0680f00e0f42f8e1b79279635a0761038dcd455e53e86f4da3e2ef516365fd0526b568ad45c1d0adc41043b98
-
Filesize
1KB
MD58d8f1edb12a0efc1a9b2437941790fa5
SHA1d4746f539de5e7e659d4d3a0424c86117517faa7
SHA25690442b7694d75183496922dddfcdb9cb3ae4bf6f75cf0b3b9e87bf2649572ce5
SHA5121d13013c0aacf661fc1125c2ca4414d06f8e2c6d13520ed62c1b4697ec30e8aecd7d8caa506bdf755e2ca3d6c67215628260d6ddaa9b1b94cf3da0b25ce0e291