Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 11:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe
-
Size
181KB
-
MD5
c6a93c5b7fe7915de3b31f133c370ce0
-
SHA1
984e837a21a137bf6cb74692dcab458ca7507fa4
-
SHA256
1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9
-
SHA512
ccc4732f3eb02c8bd447f0772958e68d43eec18dcf325e6f9139f2d37a0855ba8794afcb9ccf8a1cc937b8578f7ce07a01415a63d1bb25de5d513525f54b260c
-
SSDEEP
3072:fMyMzQw6ScvdO6gJKYpzKM/zB0E9IGOvNcbTt+vZu9MA4L9oMz:fM+SMgJppnzKIbTt+s9MAI9oA
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2796-15-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2732-16-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2732-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/808-145-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2732-308-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2732-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2796-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2796-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2796-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2732-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2732-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/808-144-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/808-145-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2732-308-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2796 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 30 PID 2732 wrote to memory of 2796 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 30 PID 2732 wrote to memory of 2796 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 30 PID 2732 wrote to memory of 2796 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 30 PID 2732 wrote to memory of 808 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 32 PID 2732 wrote to memory of 808 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 32 PID 2732 wrote to memory of 808 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 32 PID 2732 wrote to memory of 808 2732 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe startC:\Program Files (x86)\LP\BF8B\06D.exe%C:\Program Files (x86)\LP\BF8B2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe startC:\Users\Admin\AppData\Roaming\BF90C\3F5BF.exe%C:\Users\Admin\AppData\Roaming\BF90C2⤵PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD53dbc8a37853b780670f1a28fad576715
SHA17fb5c18237e69be0db457ccbc5bbc7829199dbaa
SHA256a252efce606972b80cfcd4ae5347d07fc7cf06e06d425d17e4a3adadb112579c
SHA512f7d85403fb882f4c6503b846911543fe5c9332088269c8698af7052648224d7234711072bba2f05dddabc5bc85cefc2dfa96cdd9a1004a74442b1b94c0a1085a
-
Filesize
996B
MD501d9dceaa960fd2855458e7bff054d41
SHA15c2edd9d359f1951c68f75a7f58259b9ac92b6f1
SHA256ed640e41a75cdac6eabb17ab6c765f8444faec57f89e8dfe6391cefdecedbd08
SHA5126957dda19f68190f6fefbf063045184b2d48e6e59218d249ace228b09fe7a53223c0a85dd29029129078b386d244551ac98fd50a93a35edb73e0254a799237a6
-
Filesize
600B
MD50926f23b929a037f37942b0827b1115f
SHA1c1dcae0d8b98a6b0ccc4602131811d868aa5b018
SHA25685066cd22d0891255654310b1407676e507dd528a61d9bbdaa5c2a6430a7b101
SHA5122e5d3f4d2e37331348aceb6d06cf23d7b1009d0dd818c2c45f44fc69e214f9ab9962a3daa5a812be42267509dd9e4e4d502a044c6d3b9262673314f7334bc5df
-
Filesize
1KB
MD5663e406c1eafb0e3fb8a81c246326d65
SHA1ef006dbb3bd9e695db84e5a584b8d69c2bd34e3e
SHA256ed40cfde09e9b8c182b6a475b842281199dcbf930ca52c89624654006396de84
SHA5128cba418fa0f1da04f67a3a7ce4c9ecc4905ccc3702dbd541fd875eaa4a18edaf4c1b06fbb66e1a82fd18ede43911e65d26865e12936b5ca2264d11ccb188b3da