Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 01:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe
-
Size
185KB
-
MD5
b930233139d4f03d842e104d6f6afb9d
-
SHA1
5b34cd1b06c9f3d3a65e57e20142d7e358257662
-
SHA256
a3bdf89307e1ff48a04c4a2a92e12674e4bf5c2d2272d152ffd14542074092c1
-
SHA512
5f553a8fa3e4b35ffbc0d840f5b9ea96e53f3311004d8395c798f009add8d5fbc1dfda50e3434967f164748bcb8ee8ccf973c6917a945bc8b2f0bbcc3ebc1327
-
SSDEEP
3072:LEhruDjbqkSoGsBj/4TJPZdxiqfUh17zVhpyfUh+hvHWbh49g3UlAiYN:UrumPEjwrC17J6Uwt+h49eUW
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2388-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2556-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2556-16-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2436-82-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2556-187-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2556-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2388-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2388-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2556-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2556-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2436-81-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2436-82-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2556-187-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2388 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 30 PID 2556 wrote to memory of 2388 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 30 PID 2556 wrote to memory of 2388 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 30 PID 2556 wrote to memory of 2388 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 30 PID 2556 wrote to memory of 2436 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 33 PID 2556 wrote to memory of 2436 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 33 PID 2556 wrote to memory of 2436 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 33 PID 2556 wrote to memory of 2436 2556 JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe startC:\Program Files (x86)\LP\8E33\D5A.exe%C:\Program Files (x86)\LP\8E332⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe startC:\Users\Admin\AppData\Roaming\37950\DBD8E.exe%C:\Users\Admin\AppData\Roaming\379502⤵
- System Location Discovery: System Language Discovery
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f5918dc215c7772bd6a5a70ec33433f5
SHA1d4ac45d8601c1b8976fba2a5286da8a4fce72f0e
SHA256c7df463b6604000ddec017b7d30ee7a5ad993f11aab2dca0940dd276bcc56f73
SHA5125d21ee0f9ee36220b237663c48138e081085559ff71a708d77a8b759b3c5c8988a22a45a9392158fcdbf42ada31feb4f9ed3ea6d96aec77ec4397beeea635dbc
-
Filesize
600B
MD5df280dd4e4df6997f99ba1c0db56b06d
SHA131fd2824b47d370bbfe025454a7ce864667152b8
SHA25689856e5f097f17ce1f5108f7eddbecf713f416d1194c13cbfe371c72271fe78b
SHA5125f0189e0e92cd6388601f613d4269edf937ebc8f6331ebc7dddf77c7cfce705abcbcb3519588f238e4d1b455f0ee0a4afa46a52646eed3830dc96feb7411f8d8
-
Filesize
996B
MD50e3d45cf9a0ea91bee553de7c4f7faef
SHA17b739e825302010ff5b6220a9777e39ae98f2f41
SHA25677431101a32ccb78d889b1b5947bc43eb027172f70fc79004cb6b216bec64ffd
SHA5128cadfccafeefda5cdc9e679cb9a0523b8df04de8ae397754a2c2d96768fe3cfef03b685cdc2018a1454cb56f98ed23e28f38dceaa01d324c49f1ce633dbca4ca