Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 06:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe
-
Size
153KB
-
MD5
dec584451a93a8cfd4e3631ee00a2cc2
-
SHA1
d0132f17b5d4057bdc633c62ad04c85642dfc994
-
SHA256
a13d22fbcf3e5099e6f13ee80ac8d416a9f47b796775597af3e082b090feaced
-
SHA512
6599fc29a5095fd0dccfd1582e7548abf523f51e537be50cbaf8dd8d88b7b6021634eab545297afb4c326290e3fffaecc9e15d96e285d53913db7308658a5fc0
-
SSDEEP
3072:DfnC3neLjSxerb1feK8UqoPVyqahAUYsHRCIgSxFe2nrH+GerndB:DfMn2+xerJp8UqolFlpOeuPeDd
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2188-6-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2992-14-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2992-83-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2044-87-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2992-159-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2992-203-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe -
resource yara_rule behavioral1/memory/2992-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2188-5-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2188-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2992-14-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2992-83-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2044-87-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2044-85-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2992-159-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2992-203-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2188 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 30 PID 2992 wrote to memory of 2188 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 30 PID 2992 wrote to memory of 2188 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 30 PID 2992 wrote to memory of 2188 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 30 PID 2992 wrote to memory of 2044 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 33 PID 2992 wrote to memory of 2044 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 33 PID 2992 wrote to memory of 2044 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 33 PID 2992 wrote to memory of 2044 2992 JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD593c22a640ea187e6b56a2a4c89c71f24
SHA1c4291cd71cfd12c5d2fdae4bd39ac07f724dc019
SHA256453665d0fced96c598a4e21320181a621c6e6b53aceb3cd77b6df9b9cbb44875
SHA512cba530ce4e4b969b060a476c430720a40dd25ec252e3cb531dae3609d56583a6697e67b26349f8148beeb7d0f7c028ad81d06f9420bb124e37b575581cddb4da
-
Filesize
1KB
MD5db5f901eaca1807b5977ea51270e1649
SHA1173754e2892dc91dc5b8f0194953dea3fe7e9668
SHA256a1c012d8c532b4910a5eb201b836f632ce2cb6b83de43545d8ce51ca6ba18c4c
SHA5127f8852bc994bca074e6cb719e0d66a68bdc3dbbe0f10e17d65761d2a6ff1f5fc97d9d3d8b168ad273ffdd6c0cc7d13a46b005e586a4936d41a9a329ff3b6aeaf
-
Filesize
996B
MD512dd69aa52e1d8eb7f932e0462fb24b6
SHA1ff15de98af2270fa7764518aea303cbfe97aa4e4
SHA256cf61e9e258255e25d54610f904d2f1a416456661a681bf07577925fa699053ea
SHA5123007ec808d367ff141deae80f1358d7fdebb7dd737ac4b235a539784ab0b0f7ba10fe99039e180bf3dde69938a7684ad87902a104af49aaec7150ee0c4559ef5