Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 11:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe
-
Size
180KB
-
MD5
210d758e01ef8a01a0808a94f0d4d8dd
-
SHA1
29315f7d862cbfe3eca53ece971dfb338bb21c77
-
SHA256
e66ac22a3de7d5d971c77dae5623c815cc53ab99ffebfb014ac26cd0aea2ab9b
-
SHA512
19e3c21099795f421e0fc39025ca5d6482ba1b6477f3b98b87ea758284dd0c08f34059363c1796ca677638342917293ee89f183eab4bd1d47e361dbf2a436747
-
SSDEEP
3072:p2WY9uNKKyWxchDvfSBmlQ+guC6VSUCIeKEdz8X09zS7gaYAUd:p21uNKKyWKxymlQ+ynGEdYX0S7gaYn
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2880-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2128-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2128-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2980-137-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2128-312-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2128-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2880-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2128-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2128-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2980-137-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2128-312-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2880 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 30 PID 2128 wrote to memory of 2880 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 30 PID 2128 wrote to memory of 2880 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 30 PID 2128 wrote to memory of 2880 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 30 PID 2128 wrote to memory of 2980 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 32 PID 2128 wrote to memory of 2980 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 32 PID 2128 wrote to memory of 2980 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 32 PID 2128 wrote to memory of 2980 2128 JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe startC:\Program Files (x86)\LP\D4FA\F72.exe%C:\Program Files (x86)\LP\D4FA2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_210d758e01ef8a01a0808a94f0d4d8dd.exe startC:\Users\Admin\AppData\Roaming\ADF8A\04BD4.exe%C:\Users\Admin\AppData\Roaming\ADF8A2⤵
- System Location Discovery: System Language Discovery
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5d7cdf90fc4d65816636756645830d235
SHA17c0b5130725bf25a77e72e748cbc627d8031da17
SHA256f4272e33e8f72b4853b11a73cc448611ebb23a4018b7fed3ef6ad6eb852cf10b
SHA512ff7163a83cc7b9c93be4b2c1bddcb277388a284c5f4720735aa805a0875cab7005a75387e0334b15a48f75a0a9e59a509e694dd2091d74cd8f1bbec6b6c04aff
-
Filesize
600B
MD57b09fc58a7d655e8d7a3f1c68d03a247
SHA135ab8258500a5823829cd46f1064f70005e642cb
SHA256f12e126c93680f2afb944003764686e8efacbfc99fe2ea6da1aea8b2ac70fcc4
SHA5124e9b069c2c03513cb0585ab31f848df2c5dd63069c076f4cd747cae1300894a96341feeb31b886ca71093b1f08fcf906862baa7464a03108bd8f1874daf00b89
-
Filesize
1KB
MD5d252f610fb5bf225114b4cb20d0f1f3b
SHA1a178e52fb138b5c91c12cba1a430e2d9979cc284
SHA256de2d1c956e82f840172275f58eb6766b86f24ffb7125698de02e63ee4d999361
SHA512ade25d235460e8f63abc1fdc04dce7bd59c4373f8fd672f8557dfc029bbf8c61248b50d3e3f9c8a3dfaf8353610051fb93d24cb44ab2be36fbcbee91d71defa5