Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 14:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe
-
Size
201KB
-
MD5
ac6d46dcab8ed7ade415d90164052f3f
-
SHA1
a50d1513929b2a9c4680b299a79ea7b289750bd7
-
SHA256
4cd60a760c2138cc50abf6f8d8aac362c26e50be1468b531a61cb18d4ab97274
-
SHA512
c08669fe1aeb4dd15c5e291bb7ad14808a7690141df3b1faa273de30b58548a085109ffb9b7017f0f225ade7783250b447b26c6a143c724c917cf32202f4ae50
-
SSDEEP
3072:ptZBDetdPfnhv7o4CbWnHcU3zbjgUznaBVrEOKQz6Mq3TlMg2agNFGvynNE1HJSg:ptZBDebfnhjJfDgUzSEetg2agKveUQF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2560-6-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2544-13-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/624-73-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2544-167-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2544-204-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2544-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2560-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2560-6-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2544-13-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/624-71-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/624-73-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2544-167-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2544-204-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2560 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 30 PID 2544 wrote to memory of 2560 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 30 PID 2544 wrote to memory of 2560 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 30 PID 2544 wrote to memory of 2560 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 30 PID 2544 wrote to memory of 624 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 33 PID 2544 wrote to memory of 624 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 33 PID 2544 wrote to memory of 624 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 33 PID 2544 wrote to memory of 624 2544 JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac6d46dcab8ed7ade415d90164052f3f.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2bc69eec450e82017283dc930db79a5
SHA197175d7f14a89801360a3fb80b6457c327ff87a3
SHA2567cd66aedd973f72a565b436be4530be8af8f7763b2564cde595f7f80bf87426e
SHA512efb7f217ba86b25dddc98cf8297f87e57589c73c3b70c13ee7fd90c1fc8e48657a39c3414deccd92273635dc4cafa6af04ad21c759f92af52b74c5ffb42ca0f7
-
Filesize
600B
MD57c7ee0cd1f7246bb0f6e9008e1bdba3c
SHA1740a6893a8c84cacabdc743f137aafa09eca2f17
SHA256bfbc09f8d7bc9f5a3dac323d1de1d4702e19f2f65f94c8cdf8d40b53600a32a3
SHA51211078a266691ed5fd07d5e7b18009534eb5a9f8bea5c565b848a690780f6f98599f7dde445b06d54d8423495ef338d153d532e9ce79092e0208aa8c3e3c0bdfe
-
Filesize
996B
MD53daad1b7394b61e3d8fc527545102ebd
SHA1bf56a1c735f24f7c7cb21af2dd924beb8e3dbe79
SHA2565d7a205dc88bfaf05751c2c7c7e3054ee7ad5c30f30d54508ef0bb2515c19427
SHA512c95d6dc1cbc040543b1909ecd6fe1375d439a9714ef19de473ca5f4819d104ebab95ae136f78e8f032284d04776a7c749c58863e49930b2939ee2609ad572a2d