Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 21:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe
-
Size
180KB
-
MD5
d39c67e96d120b78a5d33db7b55d369f
-
SHA1
e9cb55d6825224ad00a012a9c722f2f823460732
-
SHA256
1ed016998356cbe817d9709515498a65602e1e09297a14c4559395a4a82a25b7
-
SHA512
aaa0502c17a0410dea068f00a65b9cc9a9a7f3e76007dbaae69339961d376cbe1da1ce7d5a1d662643c093c7ba87d32e12c0bc03bf081c1b0c665206f57e5bcc
-
SSDEEP
3072:yLthLeYjope6c0GaKdfNMK14kpwi6Qw0jtqSQRRLt2pT511RRNDfzrdFT:yph/ope7D1hXpwpXUkNRZ6NdzT
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3736-13-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/1912-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/1912-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/2276-122-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/1912-281-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/1912-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3736-12-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3736-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1912-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1912-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/2276-120-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/2276-122-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1912-281-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1912 wrote to memory of 3736 1912 JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe 82 PID 1912 wrote to memory of 3736 1912 JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe 82 PID 1912 wrote to memory of 3736 1912 JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe 82 PID 1912 wrote to memory of 2276 1912 JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe 83 PID 1912 wrote to memory of 2276 1912 JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe 83 PID 1912 wrote to memory of 2276 1912 JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe startC:\Program Files (x86)\LP\6D38\35B.exe%C:\Program Files (x86)\LP\6D382⤵PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d39c67e96d120b78a5d33db7b55d369f.exe startC:\Users\Admin\AppData\Roaming\8AA39\FAC6D.exe%C:\Users\Admin\AppData\Roaming\8AA392⤵PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5b81848a2bb172c2744cb5f77a6f18afd
SHA127433aaffcbe972327be43f6e17414144fc1b2c5
SHA25671d9b5a188138fee390a83f3e1f54ce99488039e342af16f7612a5451fd25039
SHA51253c535a4a5b7e16c05d065b7e7a8178ab7a80fa75797258b33e387682663e70438843563e7117bcf0d03dc8e91c908b106cbb841c5b6a409445d2b3b5932eaf0
-
Filesize
600B
MD5f98b15a7af4c032a0a43ea16e47f2c0b
SHA1a635680f36f1902d42ffbb5e690ca39941a40f94
SHA2566ef5d595bc7d8df97cc62897b7f6603059ddc9f4501f60a548b06dc5bc8e2b9b
SHA512c3ce20d8713b47ff214795619583119460cba53336898800917eaa370635ee17c723dd869363cb524fab91f2f0f4ec230da052d6b641dc4d582cd70bcda43597
-
Filesize
1KB
MD53710effd6328272a8a1782f8b9bc8247
SHA109a63e6ee6f43bcec282cc132d9d410ceadd0f1b
SHA256086a6a5189796a83b5d4b5f1edb1dfca4d978f3c9ce8bed6a5e2943ba2b49c04
SHA512e300dbb9b5d3f7ce3a53ffb611e58dda0cff0ff7f0fda083204585549a66ae0973fee5c94a34163f6daf0980758f43823bb94c3cd076c2d2a4ac009e2321be00