Analysis
-
max time kernel
140s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 09:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe
-
Size
187KB
-
MD5
a6b6fae00bee7da928eddae33795b4d9
-
SHA1
dbf46ccee8a223ab8307346715d375570b42bc11
-
SHA256
283d2334a993e01097c1c7d01e6d5a1bbd531b77cb9ed5ef4bec802055fc49a1
-
SHA512
7781aba5dd8aaff9435853ced299329ea32825359309d27eebaaf7f68d3b8681eb2683d4c2c208195a265bb04fa9a84e447b7dbc853fff3b21d88e00ca9a0c58
-
SSDEEP
3072:TbVFc9nDbdmVniB4vegqy+fzQPRnSj/tr2SfGNxkqsm2We7ditqoVzhRtvmo0M:TCtIniBa+rYSj/52SYs0cdiIoHRl
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2772-14-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2772-13-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2464-15-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2772-16-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2116-81-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2464-184-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2464-2-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2772-14-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2772-13-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2464-15-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2772-16-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2116-80-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2116-81-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2464-184-0x0000000000400000-0x0000000000471000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2772 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 30 PID 2464 wrote to memory of 2772 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 30 PID 2464 wrote to memory of 2772 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 30 PID 2464 wrote to memory of 2772 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 30 PID 2464 wrote to memory of 2116 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 32 PID 2464 wrote to memory of 2116 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 32 PID 2464 wrote to memory of 2116 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 32 PID 2464 wrote to memory of 2116 2464 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52afc10e73c24a3068f7aea3751086545
SHA1aa63cd8bb0943ab0fcc8b6e34f8f9f9553759b10
SHA256a4e770b3ebef1b6d19a843f8a17b6773843411b2d4542013f0ffeb8c986d42da
SHA512e0b72fee60c0bf60ff425c944cae128173761ee031e383cb8b2222cb43d5f6cae17c1dd4a17a1fc0c067a0cb321302fbf85ab3a2abdb3834e05a3ddcc552d045
-
Filesize
600B
MD55c2b9007eb573ac3e5f5c8df8b62bdf8
SHA1f5e953a1aabb413fc50bbddf9d979d529d3b0bcc
SHA2561290143345741165f67be45cdc90fff0c1400238294383130804019471f45fe1
SHA5129f223bb1668251adfc206813de18b6c86286b1a24cccd85b5891dc1748a13852b08e20e9c8d7f7f81e28442822811c5bceb7dd831f7431f7c0cbda145e9edfe3
-
Filesize
996B
MD50476d19a3e62ff41c283be20f9eccc02
SHA1da18c104c0d75b53c2f9931b429c177d3d50d439
SHA256db63cd8fb1f1c4fb48744a8f7adb65bb86e8e42e866aa56f75a256184ac1e2de
SHA5124c98dc23a8c11ef5bb3a91aef2bfb0df1e367f8bfdeaa2179bbd00c540d2be1946c08271030db4a91d08c842e15d287ee52e2b91ecac3c6c7520924592fe43ec