Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 18:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe
-
Size
192KB
-
MD5
93874d928c1ced8a29c6c90793a9ade4
-
SHA1
047855b976eec09361ba9aa670ec7ca03172aebd
-
SHA256
19306c18d6426d49be40d2f210d185128ff0ad21d6ceb0ef6f6a82b333d2b912
-
SHA512
c0bc1c2649015217bec4dd4c1ad1342d6963480ab8e0ce4a026c14358d05eb63d83c06f5ef685061c612325fc83e9895e88397f63815c8516e7cdf592d03efe2
-
SSDEEP
3072:ECvA9JLl+1qsEWtM4h3phexdNgPmmbwUgwEdKge/OWIj0KF7c5UXJRLKz0o:ECAjsEWtM83/MdNgembydK9jIYxUZVKB
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2812-11-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2776-17-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2196-84-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2776-173-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2776-216-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2776-2-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2812-11-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2776-17-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2196-83-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2196-85-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2196-84-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2776-173-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2776-216-0x0000000000400000-0x0000000000447000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2812 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 30 PID 2776 wrote to memory of 2812 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 30 PID 2776 wrote to memory of 2812 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 30 PID 2776 wrote to memory of 2812 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 30 PID 2776 wrote to memory of 2196 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 32 PID 2776 wrote to memory of 2196 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 32 PID 2776 wrote to memory of 2196 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 32 PID 2776 wrote to memory of 2196 2776 JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
897B
MD5495b2baef495e1c9892b252112781c60
SHA1f38b7a28bab8837642770de34d06b010f2d68568
SHA256d2daf7d78d5c8bb02a7c2430dfbb415db347f278eee11dc86c6ec860bd161c29
SHA512cb19b73811ccf9a8ce8a8f70eea20b6b7c0ce554e310bdde9c075e20f48e123783ce82f35ded47e19420b2d1ef3a4b4a96f38fe4445d99727967899d04e84560
-
Filesize
597B
MD560f4e5cc26010247341e5365acbe482d
SHA149e582c8712e9de17bebd95e2ab3c3c42b6f7811
SHA2565946ea5f0dfa16c61ecfc00c811565ce9200c3d7ff2e9b3e91cd00b571e852af
SHA512a9ef243d43e6cbed33b293203122df2b9afaaf1f7f0fbbd47674124585a6667e59a0ea62751ffd8bc717c6b0285b28d941ddbb7b4590cfad9e256e791dabd01e
-
Filesize
1KB
MD5e03c7b98d76d12900f174380a675e24f
SHA1e579c40f5342963474302b29447516882aeb4c13
SHA2562c829d2fcfd037aa76f5fa9870d80577c8a5ab29884c44a2ecb17ff2431ede5e
SHA51276e87572825ec8a9c2bbea7d8371d6e0a0d65301f2de1a5b187cafd8cf954e42cb8f47eb1833873241faa045b91b923b98f9d2b040de8ebb2e0f070b59d4d5cd