Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 12:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe
-
Size
180KB
-
MD5
8c3c470d2ab3226e15fbca396c6981b9
-
SHA1
a4767fe04a18acd6e60e8d7f1ce81b2d3e4d664c
-
SHA256
28f755ee09403f7d12897917571bdabe00bdc0a973602fd5cd57a18586bcbfce
-
SHA512
a88b6aee9594fed50042ea7bf9d4f9e926fc2e2f8299d6d5324a84e973254cb139f513b9e84c04fee748d366328ea5b2abee9639039136d14b2b06f2e17a9a8b
-
SSDEEP
3072:hYu2CbH1bilWJILB0NpHKgWXnog3B+UsvSYBO6tCDBWpy2NUdnB:hF2CxIWSLBEcRXr+UASYBOYK2CdB
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2696-21-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1944-22-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1944-23-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1016-129-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1944-296-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1944-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2696-21-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2696-19-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1944-22-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1944-23-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1016-129-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1944-296-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2696 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 30 PID 1944 wrote to memory of 2696 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 30 PID 1944 wrote to memory of 2696 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 30 PID 1944 wrote to memory of 2696 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 30 PID 1944 wrote to memory of 1016 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 33 PID 1944 wrote to memory of 1016 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 33 PID 1944 wrote to memory of 1016 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 33 PID 1944 wrote to memory of 1016 1944 JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe startC:\Program Files (x86)\LP\24FC\9F7.exe%C:\Program Files (x86)\LP\24FC2⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c3c470d2ab3226e15fbca396c6981b9.exe startC:\Users\Admin\AppData\Roaming\C7897\93024.exe%C:\Users\Admin\AppData\Roaming\C78972⤵
- System Location Discovery: System Language Discovery
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eda1634a07f8b54969a9e9322a8a3cc9
SHA151811a27657881ebd6cf382e25b98f184d1d68ae
SHA2560b7d76ed3b4d0c73e9e902be4abd8d4cb6cd46c9422d9865db2d4cef90c1ad8b
SHA5127e25ca3b375767d927de03179e788da5995e66bd6b4c1c49bc48fc6cc184188258aa7f1487cf8946a457a03cad46f06fefa5b9c4d2b49bd4628be8d3faeb8946
-
Filesize
1KB
MD5686b2fd9c0395c11e273cc2561298586
SHA17d061c36521198aec50372efa85931bd40d326a8
SHA2568f35256f9e43d87fb11f1830724b4391a05eebfa1062e76ec84793d1fe0d4515
SHA512c1a90984187058193b66c3be66096d786880b0741467cb9287a2a3d04407856355b50457b4015b29d03c97074e3febac27000c8dcdbea0a02aa3b925fd68ae46
-
Filesize
897B
MD5a7598373814cd324566590db07fb66fa
SHA11514a4e5f2367121cf2371d7a6baaccb0f4129cc
SHA256daa5d96f966b2888dd683d8e3e196a5f5ddf26e8ac10c79f782c40f0ea3be0fa
SHA5121b08b11d08b0658a23a715ca92de85db903a03470a9e5c577b513a365bf1470c8c6e093d93c14c76c4773e7ae19c7b312af3c2a85ee217ce70b0fb19ca1e168c
-
Filesize
597B
MD5b002965ca1b6a98c0e4efeb32bc7e314
SHA143a09ba9428ef0ce7958c7561207b1fe93be9e33
SHA256ed515deb36c40c1e0b09d7aec2813dbab927ab705a49ef6f7dc2f22e23955599
SHA5127d201828a48ce95aeb3d7ab0069502ce002317c336c7d56b6ef414040861e2920818b5a85340f25acbd9aaad559e60572f6243e0ade14cd5034f81ea07a1b826