Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 05:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe
-
Size
183KB
-
MD5
1e810f8abdfb7723631cce9584e0aa30
-
SHA1
371dbee5f957f0c753befd029ca1279c83889a62
-
SHA256
6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4f
-
SHA512
684d94c81e329db2d222b18e1dc03a5b8f93d2899701b51bdc1d4cded93a77463c4f73bb535aacd6961d4bba2f15471cf71d2b57f3b737d4b70ce934821405b7
-
SSDEEP
3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm:YenoC/YgtTcKCzIbgJlaqYJCtxbFb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2468-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1720-15-0x0000000000400000-0x0000000000451000-memory.dmp family_cycbot behavioral1/memory/1720-16-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2604-86-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/1720-157-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1720-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2468-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2468-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1720-15-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1720-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2604-85-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2604-86-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1720-157-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2468 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 30 PID 1720 wrote to memory of 2468 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 30 PID 1720 wrote to memory of 2468 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 30 PID 1720 wrote to memory of 2468 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 30 PID 1720 wrote to memory of 2604 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 33 PID 1720 wrote to memory of 2604 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 33 PID 1720 wrote to memory of 2604 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 33 PID 1720 wrote to memory of 2604 1720 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe startC:\Program Files (x86)\LP\5368\A95.exe%C:\Program Files (x86)\LP\53682⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe startC:\Users\Admin\AppData\Roaming\8619C\B0E53.exe%C:\Users\Admin\AppData\Roaming\8619C2⤵
- System Location Discovery: System Language Discovery
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5988fa92aa76d43fba62863fe77d065ff
SHA1e32b41e63abd1fb9c1708db595c9e120cba05bec
SHA2566f0d12efb0e196cd22a9893c6efff1c1df6ec1fb501c83e5c865eed2c3425b37
SHA51215be9e27982a772b8000c3b8fcda4bc5eb66209ddff662878b7e0ec92802efe96a77c4229267e704d338e58cd4485227971bdf2f842fd92e3ee7c3775e0973d3
-
Filesize
600B
MD5b6a5943368a640aa30f2e54763fe4786
SHA1211f35623d7a4c8eee7d8d5a6701c0136bdfd83b
SHA25675de43b0d8c9100e20ac21a1217c8fb030337246344aadf9fdf586034754a287
SHA512e11270d277727f196c667dba7d001d6d000c41faa247075b39ffaff93906e1ee41ee04f09548f79a21b1b127462cde1ce1b5fb3e8f94e2abb5b03258b071b257
-
Filesize
996B
MD5a6674b063f58d5bc3f1a8b4526066949
SHA14c2b817e4958992690ae82ab53313ece1519029f
SHA2564070de5d28685c4f6677b2bde364202d68cb07d83970a4ea6926ed4466a1e256
SHA51289162dc556ee954ca6b1f113ddae6849163ce5dc07a8eb18a55f6dff3214ba4a79bff240470ce63d20cbfd3f03b134af36570190ce26c89c30c291d7dd32ec7d