Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 13:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe
-
Size
187KB
-
MD5
ab9d8676d6267c466fbc98498442392d
-
SHA1
2a0ccb91b7b87de5fcaf32c5bdb5cb3e269a45a6
-
SHA256
1df1e2601c47d80034ab65caf1b118627ea0b89439f83d55f7a1425b04c9657a
-
SHA512
23bccac7453ac366f3d7d325d8604c3c5b1eb9ac4860e07faf096f79564328634e9d10ca19dd15a9d55b293a7a41bf738e1d6aad6adfbe948eec6feff10c6c11
-
SSDEEP
3072:Ei5wWW0AYX9dbOKLCNh072GeTm9sZuKp2nPSqgPXWL+T5hC:Ei597diKeCa52Cth
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2916-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2744-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2744-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1652-129-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2744-284-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2744-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2916-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2916-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2744-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2744-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1652-129-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2744-284-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2916 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 31 PID 2744 wrote to memory of 2916 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 31 PID 2744 wrote to memory of 2916 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 31 PID 2744 wrote to memory of 2916 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 31 PID 2744 wrote to memory of 1652 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 33 PID 2744 wrote to memory of 1652 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 33 PID 2744 wrote to memory of 1652 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 33 PID 2744 wrote to memory of 1652 2744 JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe startC:\Program Files (x86)\LP\48BD\E38.exe%C:\Program Files (x86)\LP\48BD2⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe startC:\Users\Admin\AppData\Roaming\DF348\F5B48.exe%C:\Users\Admin\AppData\Roaming\DF3482⤵
- System Location Discovery: System Language Discovery
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5fec301ebbbb635152500d4c2df453b85
SHA16dab471b566d0d0c1b5f034e43d31e95a7a5461a
SHA2564792f3f096ef48b6d71b2ef1744274be576a7a598c087a2a6dc6b871fab523b4
SHA512686a9461a97585d367d142a6f33de6d4ab9035f44584d973537a77fc8aa8663d56e0a46f5c7e365a6edb39541677caed5ecb65bd15ce3dfaf8d81d5084163df6
-
Filesize
600B
MD5cdb54bb3604fd61e0093aa520135a6c4
SHA1e657515d967bdfc5809044165b3eec0992f1928a
SHA256a147d6c6171b1ff6a9358aa0f410da6bc648e76f61962da5c9ec081b5b7df79d
SHA512d4d76429eff84d89796d7589b8cfd7c3306c157463ef1a492d7078bad24b646a8101774f1696ee042138aad3b4ac51b3fb046d434e045635c8f502e50f6ed6e2
-
Filesize
1KB
MD593a653d73a1fbaa570bb471f1b45fafc
SHA1c8643ebbb012741a52e83b390702400d9b5bd92a
SHA25631b320d375f6338d6b3ffd69967f444989c0b05a580df08db24357924cead640
SHA512bc0373ce502ffd4c452d46b1e809fda3d82847d331e588f95a0d83c9b0d244e723c800d14b58eed8d12a021885833da6ebeca096ba46bbf8749fa7734014e273