Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 20:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe
-
Size
166KB
-
MD5
f88d4d084ed98937d3aec41a99577c85
-
SHA1
1db36babbe61a9a4bc7acc7b1b1f6e1d85d052c8
-
SHA256
11dbfd2d2b0b7d9b1eef6a2d88a027635b61594964f041d7a95aea4f0a885c54
-
SHA512
3677fbd8ccea612f02935ae005c7f8ce029955ecda1a57369dabff40417f600d02f0cd9b9bc12e20ab762e982992edc45af1e60cf01a8bc5a60f67698dfcf13f
-
SSDEEP
3072:gJumkEoT7gNXU/piZ8Gfduqllj0dk/VduxPVJh00BWwu5ViLGJ+:gJFkEG7gNXUxCVhlT4oKWC
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2504-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2000-16-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2000-73-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2612-77-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2000-182-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe -
resource yara_rule behavioral1/memory/2000-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2504-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2504-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2504-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2000-16-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2000-73-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2612-75-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2612-77-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2000-182-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2504 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 31 PID 2000 wrote to memory of 2504 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 31 PID 2000 wrote to memory of 2504 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 31 PID 2000 wrote to memory of 2504 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 31 PID 2000 wrote to memory of 2612 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 33 PID 2000 wrote to memory of 2612 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 33 PID 2000 wrote to memory of 2612 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 33 PID 2000 wrote to memory of 2612 2000 JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bf9db2aa1a1f44a7329ed05fa9998aee
SHA1c3ba13f44ee44d8158dc544754c9b8e2610fba56
SHA2560e66f30700697849e3e410796619e76389463ea4d9dbd7a8ff2e7954be034175
SHA51290ee4d5aaba899b1a323d98c37496f30df8f45687d232585d55a7b4629661882cf50b2856c74c2d0d2fb3799b6386f129e6d82aca49f2b19370a491719972cff
-
Filesize
600B
MD517d50f9e5773923b2ec5060ab0bd0f3f
SHA16d37200f68a4343e6039fdcff29ef63039850cf8
SHA2568a12a672bdf5bb29d4a67ded41ce0a8ba38f3be9b7a32baadae14938d7c95f53
SHA51207cbc97708e193bf2054de7cdff8ca8e62ed280819b640420c6348eaf03c098fe2cc29e9f13015bb15a25b1e227645a1f1a7941e71f31ec2526a5d01bfcc637e
-
Filesize
996B
MD54f5097418d4577e3cdc2b44f2aea7acb
SHA165d521af1795b4554944ceef1364a3c03e72a4ce
SHA256b551688ada66554c6f196ecbf014d23050b8ba33e2bfcf920e18f6355fda199b
SHA51277692859308748aaf82cef320fddc793cb23df1f1e37efd720d30e59107f4013dd1862f69de2cff35166d590b474cf575e06bddfbe9956cf8660ed062f0654e0