Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe
-
Size
192KB
-
MD5
7dc18ea3968011baae13911dbfdbc7a4
-
SHA1
c40f3ee72d6439a5aea08624b24d8b5d8113a26c
-
SHA256
6511c7451d8c45ad25111e6488bdf7d2ce0f0d91d5d37dbee82a16e738e3b04d
-
SHA512
06b3a2239cbf9eff0399d600c16980012396075e136e3b2548b9fadc4c89d2eb2800b34a7b6f581a310d8590a199117f5ac6d4ee7144a5a8940db253ab6877a0
-
SSDEEP
6144:m3EJLSL/1FuwlymAZc+Jv7FIq4NxevIanpYXQl:YEJLQ/1wo/qrgxevIanpJ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2740-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/844-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2844-91-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2844-93-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/844-200-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/844-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2740-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/844-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2844-91-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2844-93-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/844-200-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 844 wrote to memory of 2740 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 30 PID 844 wrote to memory of 2740 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 30 PID 844 wrote to memory of 2740 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 30 PID 844 wrote to memory of 2740 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 30 PID 844 wrote to memory of 2844 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 32 PID 844 wrote to memory of 2844 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 32 PID 844 wrote to memory of 2844 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 32 PID 844 wrote to memory of 2844 844 JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5133b214fbbe3c25bbacdbeefd502d6f3
SHA10a4307e5234c20017583a2d849b7de2b972e697b
SHA256b5837f406c5fb40f8b48ca6e4e55ef9a0de1986e152730a03b09429e4ea757b4
SHA5129bcca3ea81962e3ee1a983316e0ad645c5b58ab2c4ff58a2badaab22f5b1146d543e687865bf01153b80c3b4f474da6be477d8dc4037e4a6df98d5e858d5e636
-
Filesize
600B
MD506be9b4e553f67edac5bed9f932c45b1
SHA147d34bce04add9e35e6026e7897531889e1dd691
SHA256e47fa70db68a9273f1795e780cc6fd1b1c6a5dafdd06aaaddf4a180dd221fc9c
SHA5122f95b02cb826933ca12e060759272f155d877a51c938a16d548cdbfe6b0266471c9160a7cf873a20f96b9fb7ceb8e68786d5bd2297ca782f28e6bf7ac9d5f06f
-
Filesize
996B
MD5ba4e4d7592ffb8338c14cc16bf01f35e
SHA1b441708739155176dbb733e0feba7a93495ac379
SHA2563bb24190ea4e9cf0a90a781e87720464518e7b989d8c76eca755f5fd78d67d93
SHA512335e0d1eba8da7ec8e6f029d8837d22d2200cec8df9d84b55c6e284d9819d6c304fc24892ecd18cb467b355d4e0eeb91ea60752d1c1966a3272938a7da62db37