Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 17:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe
-
Size
173KB
-
MD5
aff739d105557a8917b8434d8e6eabb4
-
SHA1
6f66e044c7b49b2afee60431779ee2ff70b68520
-
SHA256
69c096891b96c8fbc81dfa8810dcb44b4d90212f8906080fd1f2f366e98b9b18
-
SHA512
0668718c7d0515415e08323ef70fcd025080397d42296a82bb7d93fe0b014bbb4b23a255c30715e6610978e46db1b1f6b8da167ee82c4f61484d91502e388b88
-
SSDEEP
3072:DKap6OBhoYZcCGgPs8nQyLQ1bCSDAXTUPYNKVaHSBGndBTg+TtzF:NfL08nQyLQEBTUgNpHqGLTgYt5
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2716-6-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2744-14-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2016-81-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2744-82-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2744-183-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2744-1-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2716-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2716-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2744-14-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2016-81-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2744-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2744-183-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2716 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 30 PID 2744 wrote to memory of 2716 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 30 PID 2744 wrote to memory of 2716 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 30 PID 2744 wrote to memory of 2716 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 30 PID 2744 wrote to memory of 2016 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 32 PID 2744 wrote to memory of 2016 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 32 PID 2744 wrote to memory of 2016 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 32 PID 2744 wrote to memory of 2016 2744 JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aff739d105557a8917b8434d8e6eabb4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b271def117e0ac7c149c3904d87e0732
SHA15f8b757605ead22ffd633fee0ac92569ae3b63fd
SHA25621aea57b3c97689747b162f92f2c5d8761c5e96ab36d59d8e39b006f06ec70d0
SHA5129d4da19653e5d8a5e4c6036151f52855d678e15183a6ba4f1720eb76fd866b78faf3bdd46dfecef426a071ef5b002a9b4ecdaf83ca515fc799452211065aab77
-
Filesize
600B
MD5739141d7d5da4995070c004aeb745774
SHA11f7634c62d12aac74cbdce5cf44d56ff62a62354
SHA2563f5c59c37f2de696d4e602a58990e904ebfcd6ce96b23cfe44b18dc5ed128183
SHA51210fe622ba7274664b6ca326cc5770889339bc3b14657d8a3ba015aa945e954ad27fbe8fcadb061ee156186f38a6993a92434d27a29144b5b04671d898cbe0049
-
Filesize
996B
MD5063fd41c2d11672146870bc608b979ad
SHA138b2eed3bd8bc989f2e4b9d3cbd1f32df2fbb181
SHA256db9970819ac34a54689aa2eba6d29eb22e015c73a21b0e8f96e3c3c740eddc81
SHA51211a270512b044472b0beb5e881f99233150fbce72710e252f1caa59795693c79ef2ec3c088c776dbf514a73923611e584e9c0d76781998cb5ab76f7062551352