Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 09:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe
-
Size
204KB
-
MD5
c4464656a3d490b10b3b71b6a2287f65
-
SHA1
ce63f750fbca1f74dce30d30f94b28790a644d52
-
SHA256
adb57815b3d5c3b17f340101ab2397124a45a0450af96b66ecac60e5ef7e704a
-
SHA512
4562b8ef946ab317b2ace064fbf2717bd28c4fbcbe7554bfff6f37fd171a4240ec40d90d099a11aff697523c62e42b1d0540ea64244a32f9606776c32b5ecd29
-
SSDEEP
6144:67b6ld+AyS0Ugndwef3MYkVvpXQfItsw:67e+rS0Ugdww3nkPQu
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2016-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2016-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3056-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1484-85-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1484-87-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3056-192-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3056-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2016-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2016-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2016-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3056-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1484-85-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1484-87-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3056-192-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2016 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 30 PID 3056 wrote to memory of 2016 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 30 PID 3056 wrote to memory of 2016 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 30 PID 3056 wrote to memory of 2016 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 30 PID 3056 wrote to memory of 1484 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 32 PID 3056 wrote to memory of 1484 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 32 PID 3056 wrote to memory of 1484 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 32 PID 3056 wrote to memory of 1484 3056 JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464656a3d490b10b3b71b6a2287f65.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d28d6ea343caa87dd1be8a0f6fafc6d4
SHA1603039e67e703e8f897c7fd050f34b42f03d9440
SHA256277e0217ad682282d9a0f51d99e12a522ffacaf9d3825df460f9b0f67c30fc53
SHA512fc0447a742a414151a2bbb661a518a4457f086efe8d658f4596818a9d8f4f702832c6598763bab9f5212ebf91cfad334f210cccd133b5a0f9eb88f64c94fc833
-
Filesize
600B
MD561d3daef25fba4c8a54ee66433b23877
SHA1ea7765e0abf40647bd47a127b34ef55305f00241
SHA256e5b2b386c8ccb4346de7e95d16c85609959d0a3f95b08580df12ecbe0cfe5a94
SHA5127bf8c84d477326036ae75d30b66fb1d5f9f318ab416730be5aa452f606de2b046829c745ad39aba5ad6fe4d4c8f8ab097dedd5555bb1e8b30a0e6b72d78c3f64
-
Filesize
996B
MD538b1035179ce5bdbfc301a329fdfe04b
SHA132fb4d28ba00a0138baf7d29e0c3687e7384dfda
SHA256d30bfcf179bd1d4165ebc135fb2955c817561b7c30500ced57e282b900e28266
SHA512d82b54e9a69a8fde6dca421a0cb9ddd4fb6b7881ae618a296e85e81a368bc20ffc61727fafa5d2bcaade2bc4d42fc9040359f32ccc2b35941dc5be7de659e00d