Analysis
-
max time kernel
141s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 08:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe
-
Size
175KB
-
MD5
1fcbb0cbf116c2e621a7c4adb7d0e768
-
SHA1
1fd71babfef6a0011ad13a73f712fe9fc6e62fcb
-
SHA256
01d02ddc2f00b0b195dab2b87f7979f477fe227afaf1516f01b6c88a9d726a2c
-
SHA512
55616025614d2806e81df4e3a5b56ce05333105f100183e757b8b10649c429aafefdc0e6312e7c60a15193e8ae02e9aedcd15659599699558ad64cc242dc0288
-
SSDEEP
3072:t7cak4yzm8z61olcDGLKJ6cM9J9NJmjlac6DlFwQhsZGvt36w6gH+:t7g88CoRWJe9JTbFlFsZGvtKw0
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2440-9-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2280-20-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/944-88-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2280-198-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2280-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2440-8-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2440-7-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2440-9-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2280-20-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/944-86-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/944-88-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2280-198-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2440 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 29 PID 2280 wrote to memory of 2440 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 29 PID 2280 wrote to memory of 2440 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 29 PID 2280 wrote to memory of 2440 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 29 PID 2280 wrote to memory of 944 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 31 PID 2280 wrote to memory of 944 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 31 PID 2280 wrote to memory of 944 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 31 PID 2280 wrote to memory of 944 2280 JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcbb0cbf116c2e621a7c4adb7d0e768.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD53a9666c66b29c7bb01a528c796121698
SHA10d3ac0eb51def0fdbf3c7d30066d4e9c97cfd6f3
SHA2566e3a647898ea6194348f09fb401e6828024e2353c13fb21cbbaa3c08cab83a71
SHA5122f543c1b441524cb5ec0f6a719440df4921b9db861641c9f15000f31858b7dfc99d8c5eeb7adafe6362b56c87fee69cda02964362b1b58413c3753f3e989f790
-
Filesize
1KB
MD508728f8fa24e778826acdbddfd244f19
SHA198d96f0bdb26272025d7ce1df69a2939fe4efcbe
SHA256ffa4355309e79be93ec142f848c798287c2f263d3a3dea161c0a9359ad29e25d
SHA5124753d015ac14a0162ccd04ce7c4007a8b37543a492754fc29edad8bb2e1c72fcad8f50c2631198d3d5fa6ce9edccbb3e31fe259b915a2f4a897029ac49d2fd47
-
Filesize
897B
MD521a3ba1d08b94b4ed4e59f40a3e777bf
SHA1007d73c849cd732e4604daba31cb5c255ebbf61a
SHA256daeff4f433ef9830a816942308acf1e1fa870f2c365a204dae117e2a4dfa9cb8
SHA5124545d2f941f68d91364995bae205d7a6354189115e7c620a5cc40ad6ada23b77982eb3132c734c5bc30f86fa9b8c8720c2301570d0b8024a7911807236e16ed9
-
Filesize
1KB
MD5313beaa27e946eb222e4e19dc4b14e6d
SHA162755ee37948786fb2d1bc3fc6e9f943c5df771f
SHA256c1ba116c94b54bf329e8d060c0e6a6dd217f4ab327b2a8e60c2c02c388d9674f
SHA512aafd770d7f2bc53fed5b18e0461433d7647cc78d1f64bda39c6896399e24a8824b34f5910e966e6d6f6cf939dc6e604cadfdfa29c4bef1952972c8381700ebda