Analysis
-
max time kernel
140s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 17:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe
-
Size
181KB
-
MD5
9265ce4b240f3c281fd87c1dc632c669
-
SHA1
daa047702af56feb0cbbd4967a8e935222d187dd
-
SHA256
a30f67a26663ebc6973317fe0354660e1b7beb4c4d8b04108a5ea3a6d3fbc9d6
-
SHA512
3a8e82644bd1b0b890213fe6094781f1221812947913f593ef8a37310485ff99987fa6cfa99d2b0b56e95af479121a250822484dfa23c055485d4e601ae2a5b4
-
SSDEEP
3072:a6SZtSiXmafJzHfpJvyyY3a2XiIAusM6eUKZ7WJblQ/U:a6KSiWaf8y+yIt6eBYw8
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1892-10-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2104-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2508-92-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2508-91-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2104-199-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2104-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1892-8-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1892-10-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2104-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2508-92-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2508-91-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2104-199-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1892 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 30 PID 2104 wrote to memory of 1892 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 30 PID 2104 wrote to memory of 1892 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 30 PID 2104 wrote to memory of 1892 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 30 PID 2104 wrote to memory of 2508 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 32 PID 2104 wrote to memory of 2508 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 32 PID 2104 wrote to memory of 2508 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 32 PID 2104 wrote to memory of 2508 2104 JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9265ce4b240f3c281fd87c1dc632c669.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c71fc8722ddafdec764cf19c8545da2e
SHA10295e3a65e1e159d8a1ad691e3f6e030614781a7
SHA256e47fe5ffb1b5e3d33efe17ee611a685e2fdec58f1274023e3659004005ddc348
SHA51290160c50d91f1898e31d31cd7a3710247dc6793a5b569e73d498da681291d29f57617294a810376ad33aebc8847747bdc0d50b731688c53fdcccee314c738603
-
Filesize
600B
MD53cd7491d3b0868ba111b8abe64db7da4
SHA15251a5b4967aa1df8644c6e777200f1e425cca65
SHA256551dc5fcb6f8f1c37c1112f142c3f0fadcb9fe538953afe014088e85861d5157
SHA5120535cbadae42a50e2cbd318f521072eadb6c798de301dceb64601d1e0ae49fe57e730e0cde3fdddda10ce23af51f48fc4e9023bb01f604c201301c351bfedc33