Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 09:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe
-
Size
187KB
-
MD5
a6b6fae00bee7da928eddae33795b4d9
-
SHA1
dbf46ccee8a223ab8307346715d375570b42bc11
-
SHA256
283d2334a993e01097c1c7d01e6d5a1bbd531b77cb9ed5ef4bec802055fc49a1
-
SHA512
7781aba5dd8aaff9435853ced299329ea32825359309d27eebaaf7f68d3b8681eb2683d4c2c208195a265bb04fa9a84e447b7dbc853fff3b21d88e00ca9a0c58
-
SSDEEP
3072:TbVFc9nDbdmVniB4vegqy+fzQPRnSj/tr2SfGNxkqsm2We7ditqoVzhRtvmo0M:TCtIniBa+rYSj/52SYs0cdiIoHRl
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4912-10-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral2/memory/4604-15-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral2/memory/2560-89-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral2/memory/4604-196-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4604-2-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4912-8-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4912-10-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4604-15-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/2560-89-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4604-196-0x0000000000400000-0x0000000000471000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4912 4604 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 81 PID 4604 wrote to memory of 4912 4604 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 81 PID 4604 wrote to memory of 4912 4604 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 81 PID 4604 wrote to memory of 2560 4604 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 83 PID 4604 wrote to memory of 2560 4604 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 83 PID 4604 wrote to memory of 2560 4604 JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5370c851e8c84cffa34fe6e48aaf13cce
SHA1a34843350f5fd8711a2eec849b3746d73df4aa10
SHA2567f7d6c3d9f49dafdfeff290ebda06fa5a05b53293425d7c55ca68838078b4ad4
SHA5128e2e15baa7453eecd167b4a6d0070faf3d6fa321ebbc75f54af514f2b08073405f81f24e8fb2ea76e0aeb9779a43b256681472658677318ce2a52bc403a61e73
-
Filesize
600B
MD55612255145427e706d6370f70ce228b0
SHA1c750c8d092d2b135c4fb3232ba1dd9cc7e333daa
SHA2562d2d1023ab8e3929b48bff0d33d55b0490f312ece201ce8fd28758f85a4e486b
SHA512395fd80c091d4929ce82c8c8cfbec6202c6ce22537e77a23e7965f074e889d3479c7f82f3a57f3ddabbdb09036490249084d997941890c299f28558eec85fcdc
-
Filesize
996B
MD547adbebea09c3739ded124e2bfc6515b
SHA1dd5cba685ad74c0c203533787457275258f83c9e
SHA256d1a8b87bae3328b5f9f929982c3722b1e2b28e29f9a965dec7106f21a56d175c
SHA51226865614161078dd6629174db4c59ec5207f8d5c415ea93a2663697200fb9ed2f57a0a83809906038055c349758303bfb745e45f0068d2be894e2136c7135dbe