Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 05:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe
-
Size
183KB
-
MD5
1e810f8abdfb7723631cce9584e0aa30
-
SHA1
371dbee5f957f0c753befd029ca1279c83889a62
-
SHA256
6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4f
-
SHA512
684d94c81e329db2d222b18e1dc03a5b8f93d2899701b51bdc1d4cded93a77463c4f73bb535aacd6961d4bba2f15471cf71d2b57f3b737d4b70ce934821405b7
-
SSDEEP
3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm:YenoC/YgtTcKCzIbgJlaqYJCtxbFb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1008-12-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/1692-13-0x0000000000400000-0x0000000000451000-memory.dmp family_cycbot behavioral2/memory/1692-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/1564-87-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/1692-188-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/1692-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1008-12-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1692-13-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1692-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1564-85-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1564-87-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/1692-188-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1008 1692 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 82 PID 1692 wrote to memory of 1008 1692 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 82 PID 1692 wrote to memory of 1008 1692 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 82 PID 1692 wrote to memory of 1564 1692 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 88 PID 1692 wrote to memory of 1564 1692 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 88 PID 1692 wrote to memory of 1564 1692 JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe startC:\Program Files (x86)\LP\24BA\C25.exe%C:\Program Files (x86)\LP\24BA2⤵PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e810f8abdfb7723631cce9584e0aa30.exe startC:\Users\Admin\AppData\Roaming\A20CA\FCE24.exe%C:\Users\Admin\AppData\Roaming\A20CA2⤵PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b91f1684f0d204b12821181d741fbedf
SHA1ae77a09db9924dea4ac66434b3a510eb117c1840
SHA256f518739160893854e5d127656f38192711e8f6cfe4b048a4669de3193ebe07fc
SHA51262242875c3f33618d5593d380ee3c62a632b45c824aa2813626bee76424ad0f275b5feaff0490ab16d2a42351b5cb9f14eb72f5e7fe93b33c895c64f515a26bd
-
Filesize
600B
MD533cbd9dbd0df4dc0df74c048ac3e61be
SHA1cc9a82aa2113e1d3e35e8f68c05f18dab0bbaf0e
SHA256a1dddf4d3bae93f342460d6cca934df5b4fe78698e15474ac3cd0aafffa61351
SHA5120c4f543d260b3aeac6b747d162cd409a7bb307643894fce406f1a44390580bf9bcfa78e5aa928a8d075440c36c02a8db9de88451ede0858fd94e7f9d714d2be0
-
Filesize
996B
MD5ae3bd5eb1cca138d3201673137d56492
SHA1b061f680ff2ece02d68eb737e9cea25aed4cb82e
SHA25664fffd8332054552602e2662b328a06b1511a808b2316e514edbbffcff5941b7
SHA512c506be78ec77f57d048d7177684649ddd39202b1ff062065fb59d8c2926680907160ae25dc9395d3410fed9399e8763cd105d42132c7e6873cd3f673ae059fd9