Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 21:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe
-
Size
156KB
-
MD5
b54658f1fa7b95bbc1ad9779e9df0d7a
-
SHA1
847b723bf079145616811ad8d774524606057e8a
-
SHA256
764e162e3b5b6eea459286575442cc2a06878db1acdd87426392b896662e3700
-
SHA512
cd5812cfe2335d39a4400035888ca450947a9ea7b6f82013f6e823fb2a6aa8beb24d13da128aa37cf007e079c21cb2616bc8a22fe270d786b4590d9cc81e0365
-
SSDEEP
3072:h1AV61tuPhQI6oJu0Dwv5n+qrKw/ZwTGARKCL5Mfk1DTRX5hffsnz+pTi:LbtuPheR5vpnmcQRJL0ADTRJ9fszR
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2420-8-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2676-16-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2716-76-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2676-77-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2676-183-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe -
resource yara_rule behavioral1/memory/2676-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2420-5-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2420-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2420-8-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2676-16-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2716-75-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2716-76-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2676-77-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2676-183-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2420 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 30 PID 2676 wrote to memory of 2420 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 30 PID 2676 wrote to memory of 2420 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 30 PID 2676 wrote to memory of 2420 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 30 PID 2676 wrote to memory of 2716 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 33 PID 2676 wrote to memory of 2716 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 33 PID 2676 wrote to memory of 2716 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 33 PID 2676 wrote to memory of 2716 2676 JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b54658f1fa7b95bbc1ad9779e9df0d7a.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5498d00b51c518b2df22863d66718c5d7
SHA1c119b00d6e3554c6c0b479c329ce1ea3a23758eb
SHA256b7154587d4760f0c5a9e8607d2ae61bc5b65290b6fc13440a9f6aff5b443570f
SHA51227d5bc209ef5f169109decabab0cfbff62c518478a70de6c4a1c4ec042561b8c910cf0d99a5b4c406b8ae4231bba521574bab4a5477dff95a5212f088d7f6454
-
Filesize
300B
MD56b333101d50d4b564af5738daf399312
SHA1562219f018f1192bbc59ad9a799e7d04cdb27cc1
SHA25692b93234e9a6d8f56c1c66ca61bb8793972404446f99503f619e97b3c2fdc817
SHA512aa01c7f5ae4936bc3dd207b529eafe722dc17b1c820f042b5d4d8daaa0b70e51e333c6f599875f8bc1d0692fca4f4ab43836e1112bc0eee1e2c328260fbb2390
-
Filesize
600B
MD5cbfa8298511743d213f63eb2a2e34c49
SHA1015f526c2a6dfa936a56b4bb08c867cc223e331a
SHA256460c292ae5e3c2eda2c8d5b0b46b14e97178bd37ac309a7bd95e7dd722a8e477
SHA512ae90790cd2633c2ecbcb592baba405fd75bab0dd9e2f65442f9fbdfa17b1a3440eccb6ba88a3507fec89c5c9b1f989e2afcedd639d93096dd2b740ff130e7455
-
Filesize
996B
MD5fffa48f07534fd89bfafd609ac929e8e
SHA1be6f2bc3f2a398ec506ddbde5c8ccfe31d2991de
SHA256bbff7bbc7c557ac4b9b9d5ec11edc8cb3b9636bb70e82785aaaf38cbe7d564e7
SHA5125cfc8e700218ba426f628dcbce542bbd06efcdfa6ce731c616cffd93258b03d03872a2ae884b6c6ff168b0a33073a176b51eb9039f41dc138e76bacadee2ba53