Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe
-
Size
187KB
-
MD5
09bf2871366bd659106ef87a730dbb93
-
SHA1
0def6e2171f09a8f46560eb1b08d2f331b61d3b8
-
SHA256
c50b8784bdb9e7042be8780bfc29a1383ae374eb113ca85ef1ae5f240ffb0374
-
SHA512
7c4b5fd67b8deb48d02a8283ad7a93e07bbadffcea40b1e7d2d84fc375cf8c8f66a94d51126d273c9d867d56bd39c6dcf1140e2effbca3e434b9c23b0ec8603f
-
SSDEEP
3072:6ln1hM7rnOC9PqblNEs9W20+6aPl69QVrjIbO+1Bausz7w7EJ80JGZTnj:6ln1anOkPqbl2sUuPl6WIC+oE90wTnj
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2880-16-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1972-17-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1972-18-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1608-130-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1972-297-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1972-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2880-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2880-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1972-17-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1972-18-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1608-128-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1608-130-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1972-297-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2880 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 30 PID 1972 wrote to memory of 2880 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 30 PID 1972 wrote to memory of 2880 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 30 PID 1972 wrote to memory of 2880 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 30 PID 1972 wrote to memory of 1608 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 33 PID 1972 wrote to memory of 1608 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 33 PID 1972 wrote to memory of 1608 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 33 PID 1972 wrote to memory of 1608 1972 JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe startC:\Program Files (x86)\LP\5E12\424.exe%C:\Program Files (x86)\LP\5E122⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe startC:\Users\Admin\AppData\Roaming\2EE4D\AAF5E.exe%C:\Users\Admin\AppData\Roaming\2EE4D2⤵
- System Location Discovery: System Language Discovery
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5d03d00ba414006c2ca53c9db2bdcf738
SHA1ea6bdf95e11e1786905bbc9510d8bfdc805ceb94
SHA25694fde5896f2fc6b625b45edd3d153093de77f875538f99ef2b1fb443f2127a31
SHA512a441b55771b48bcff0bdc0f7e2b4687f5cc8811ede7f50b1b94afff5bf6113a1faf2573ae5c5f6710fea8d8f6e03118620135c7959a1edd5aa1028a776265443
-
Filesize
600B
MD50e7c4d964f0579732287a042b0ca093d
SHA19386dd9fd8f42cf2c973d1b3fedbf1e8d3b39939
SHA256c1843e6edd7c4012d128c8748f2f5386183e51fee6720d15c6c1c8f607453d18
SHA5127ae4ee8d4cce4741a0940d76bc5fd3fb559eb6e1bcd2c8c6caf50685777d327610f8be230abbbd01184cdd339c3c75dc3c486139ec74484a115162fd32288b23
-
Filesize
1KB
MD52868c4c3daa813f86744bca057e48a61
SHA17a4fa40d58177f41268b57818c8df975542ad3e1
SHA256bc8000d42bf4ad4f8fd8afab9bdc12378c02c07ec10e55a889b58d7d4ff9c8f3
SHA512af3cbbfad056d126dec42c06f18df60953ca1fb38c0e8af81d00ade45e28d155631d7677c01c4896d695ba9c2e67e5214931a1d5afd305bde2d003a3fffb4a7e