Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 11:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe
-
Size
181KB
-
MD5
c6a93c5b7fe7915de3b31f133c370ce0
-
SHA1
984e837a21a137bf6cb74692dcab458ca7507fa4
-
SHA256
1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9
-
SHA512
ccc4732f3eb02c8bd447f0772958e68d43eec18dcf325e6f9139f2d37a0855ba8794afcb9ccf8a1cc937b8578f7ce07a01415a63d1bb25de5d513525f54b260c
-
SSDEEP
3072:fMyMzQw6ScvdO6gJKYpzKM/zB0E9IGOvNcbTt+vZu9MA4L9oMz:fM+SMgJppnzKIbTt+s9MAI9oA
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1744-13-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4696-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4696-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/5044-125-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4696-280-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4696-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1744-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4696-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4696-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/5044-125-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4696-280-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1744 4696 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 84 PID 4696 wrote to memory of 1744 4696 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 84 PID 4696 wrote to memory of 1744 4696 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 84 PID 4696 wrote to memory of 5044 4696 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 94 PID 4696 wrote to memory of 5044 4696 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 94 PID 4696 wrote to memory of 5044 4696 JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe startC:\Program Files (x86)\LP\2CCA\F46.exe%C:\Program Files (x86)\LP\2CCA2⤵PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6a93c5b7fe7915de3b31f133c370ce0.exe startC:\Users\Admin\AppData\Roaming\A4909\9E42C.exe%C:\Users\Admin\AppData\Roaming\A49092⤵PID:5044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD57a17fe33a7e2948f14846ca0996f8157
SHA154f7fed04d20ce78b64c37f592b9b2835bde8825
SHA2566c18cccc017f6518ba7e495359423ce0d8dca2cff04477067940fae3bd4bcb49
SHA51212651f734dada20924e621b58d4dc1f2992bd3567a8082dd2eb3c4e85133350842cf62a6e0f77807093a7ebe91e1c97d8539374fe4a3f38ac0e994e976d03ec0
-
Filesize
600B
MD58503e20d3dc65931d9ebfb60306c5686
SHA13e82fb8742ccc09faa3325aae9d37cf8c7451592
SHA25600b82557665da0fc7f4b88b073d26120a2fa9c114d6218dd26366277f05c4b71
SHA512fccffb118fb285fc9644cf7e9746012f7a668d875688265014a2fabdc6c4faa689a521509caa075423c7acf16a756acb540dca0dd51a917954142ebff784a419
-
Filesize
1KB
MD58b9ac48af6ae148b43bf7c730430d279
SHA178d09a1839818ae2ad39aa9536aa8a29d4356b9d
SHA256a06288aef4cecd6e9d8288f25f8dc95c4807f4c8ddec659348bea4d90734bc4b
SHA5120e262543a040fd5f61a91db948e231a9d05336b7197376c0d54c2b0944d381b23df89e4f081d689a9ded38e41531abbe198dd9adfe1098fe1e6d629dc6eae651