Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe
-
Size
157KB
-
MD5
e28a5b69ca6f07ee13cc751d99b3942e
-
SHA1
f38e21f245b3f5e2f25c77a6fd2624f1c6e844d4
-
SHA256
9dfc8c50e3f1e13494fe702172803b373d7c9a1433ef0e4c3ed58402124a73e4
-
SHA512
d806237f2681af6ed6c4dcce1827646c56b2f67dd7337dde0abb4bc1805904dbb52ae4c2251eb89a4906fd7a5beee8090f33550340902fcff733b76b78c9407e
-
SSDEEP
3072:wSNApYXHYzNrVwv8W8X8bolXfxAjiyg6PlSi4jHa1Ev:wS6Y3YzNrVw0W8X8b4pAjiyvwVjUEv
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2664-7-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2076-15-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2844-96-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2076-173-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2076-213-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe -
resource yara_rule behavioral1/memory/2076-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2664-7-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2664-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2664-5-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2076-15-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2844-94-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2844-96-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2076-173-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2076-213-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2664 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 28 PID 2076 wrote to memory of 2664 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 28 PID 2076 wrote to memory of 2664 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 28 PID 2076 wrote to memory of 2664 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 28 PID 2076 wrote to memory of 2844 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 30 PID 2076 wrote to memory of 2844 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 30 PID 2076 wrote to memory of 2844 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 30 PID 2076 wrote to memory of 2844 2076 JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28a5b69ca6f07ee13cc751d99b3942e.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD527263554485564fc81bdb7491aca2005
SHA1a7551864d57b792f7a0261317bab442281cf610b
SHA2563e76839db5e0b2cfd8f5089d346c80dd28ee21bfd67f04b4d60f82a482339992
SHA5129158c38c3be7dc5dd9d7a4c2acd35483c7b88847a63bc3b1bb719241acebb1e2a294049fca8d4435a5d7b93182d09977e2327f1777f40cdb9435c153fb5d2685
-
Filesize
1KB
MD5205760a015aa178b96152e138a597752
SHA1c4e01b2ef98e384c538211bed82c510c7590c679
SHA256ffec0096991b160d2fe565b37259c86c500730d9e6406ce616653c1a189906e2
SHA5121b1738fde4469b68b88e308f9a07119e3b9a0923dd90bb3b18e26f3e6516def97cc8dd63fbd2c6ba12162a17f863d318853892ebb867946fba59c6bf6711429b
-
Filesize
996B
MD5a2187dee6c643087ff92c432048c1f50
SHA10d57527aea28bb3a599450432f3ee7eb521746b2
SHA25614f54fbdbce87aa6d11fc336796eaeb1fc3bfe10453ebb8bd14d0aeca11f4a7d
SHA5129897acf8c2878c9ef1709b192f21e8e222a69e0ae19efba8923196fc5431fcc43ff80a8432a2a636ea2ce6d7f9c0ad0c48db539e98d2b2bfe2577957b742b4b8