Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 00:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe
-
Size
181KB
-
MD5
b86b1af0c43dd25430b2e55a9d04e792
-
SHA1
ddf330615b9b6398f468b463b0c4dcde573ee5ad
-
SHA256
109808d529a2609c56c95de0316c3bf407d71458856059e687ba2b37c45d50bd
-
SHA512
e2a033ea72095041335e9d705646a94f33d6f2975b20781abb594a5db366e2c27fd5cc2e9417de68b3b659b388d75d6dbf4d9689541c6fe2de5456de1e230eef
-
SSDEEP
3072:NMq8g2qgBPBOk0ulYM1agUHqwbhG4hEDD38Xumy94V590m6fXEM1EBs0UFZy/jE:Njz2qQOc1agUKwbhADD37l9uRBs0IEr
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2080-16-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2168-17-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2168-18-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1940-129-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2168-292-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2168-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2080-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2080-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2168-17-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2168-18-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1940-128-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1940-129-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2168-292-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2080 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 31 PID 2168 wrote to memory of 2080 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 31 PID 2168 wrote to memory of 2080 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 31 PID 2168 wrote to memory of 2080 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 31 PID 2168 wrote to memory of 1940 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 33 PID 2168 wrote to memory of 1940 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 33 PID 2168 wrote to memory of 1940 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 33 PID 2168 wrote to memory of 1940 2168 JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe startC:\Program Files (x86)\LP\BBA9\ADB.exe%C:\Program Files (x86)\LP\BBA92⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b86b1af0c43dd25430b2e55a9d04e792.exe startC:\Users\Admin\AppData\Roaming\980D2\222BB.exe%C:\Users\Admin\AppData\Roaming\980D22⤵
- System Location Discovery: System Language Discovery
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5f3c123ace8b6c0c52348a1aa01f108f1
SHA10c08ab88f0412fa8be8273ecb7a503bd9be05173
SHA25663334fa0c1b16aa4729a7e7e1a3ec2ebac3cc4b7552a7c384727252233cfd763
SHA5126a6a30cffe8585d2bb9c4b939546f1e35d9a3d47d73466b8e15003c3039fea69dfcf96df0efb680dce37ba56cb850a7b1321af0c4de1e62dc306b3d496568e2b
-
Filesize
600B
MD5089d9324408f318d989ba58866c224bb
SHA16ead490b235147d6c7fff967e56ffa44aa339f12
SHA25685b729b99a0a59fd9697db66f6f40485345ad144e647b9e53ff90f35e23c9cad
SHA51240fa85d8252f4e7e1e5ca2ace224588afb927e571984b26c8c041fa3ee0fa1cee742835d479a98f92874ea06841985ea6cdb51a024136bab25b7728a4faefde0
-
Filesize
1KB
MD5b3c6d543fc9dd236c51cbc227c1085c4
SHA1093b4873da740b5f9968d19cbbb82e617cd6989d
SHA256605425e98066013c136b183c66ba447d2e38d7be76045fb244da45849f01fe35
SHA51290b3359edb674499a3da53fa1d6059ef90085ce761f085bc5e403d4762d9ca8d6deabb6195319e79e3774af9d9a22f0fe06959d021bc045594c9631b790ce306