Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 18:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe
-
Size
176KB
-
MD5
245daee68eea89ca3a91075c41fb7a62
-
SHA1
b48dc350211830608197e895bc35c7bab80fc931
-
SHA256
0e8151b85637b25c22bf33a83280dcccdad86803816afb753a236b38d76e91ef
-
SHA512
6e5c08e63b26b96e2e0845b2341a2dac6c72a6d95aa714c3dd7073b20aee77e57ef05b6b33ce325f2b94f7cd0c3bc9f66b1320380077825f21f2e674f96d1774
-
SSDEEP
3072:s9m82KS3gIf/zsadINGlYQHuM9ATNN/cMFAByiP3ioi6ZYn04PctBkeaiWTISh:s9PkgInwGImH9WTDcxByiPc6an90t2ew
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 2 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2596-12-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2596-185-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2596-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2596-12-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2596-185-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 2316 2304 WerFault.exe 30 1148 2516 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2304 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 30 PID 2596 wrote to memory of 2304 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 30 PID 2596 wrote to memory of 2304 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 30 PID 2596 wrote to memory of 2304 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 30 PID 2304 wrote to memory of 2316 2304 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 31 PID 2304 wrote to memory of 2316 2304 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 31 PID 2304 wrote to memory of 2316 2304 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 31 PID 2304 wrote to memory of 2316 2304 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 31 PID 2596 wrote to memory of 2516 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 34 PID 2596 wrote to memory of 2516 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 34 PID 2596 wrote to memory of 2516 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 34 PID 2596 wrote to memory of 2516 2596 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 34 PID 2516 wrote to memory of 1148 2516 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 35 PID 2516 wrote to memory of 1148 2516 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 35 PID 2516 wrote to memory of 1148 2516 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 35 PID 2516 wrote to memory of 1148 2516 JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 1043⤵
- Program crash
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 1043⤵
- Program crash
PID:1148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5d1d4f5476fd6f581ebd9f5ddbaa329b7
SHA174c4379feff3ff6c8593cc1035b76324a169a5d1
SHA256b04168c447930b901f4181a012ef109e8fff0096ab83492af163d1f7bc9b09ba
SHA512c9922906b71fdab31665586381744a1fbb5bf8f32a2f3cf8f6412def806446ca88f71b160a6cbed860408ba3b333bcbb837c39410114753aba5cd7050bdb55a3
-
Filesize
1KB
MD5aada8d798287be43923fd44f6a118380
SHA18027a6fd2ac92076be1d46ba3c2cc55ac9fbfadc
SHA25668f95864571af495a435884492a54d0f6efaf74d43ef6819bf417ba3f66c155c
SHA5122c3f447a408469195305e74cab00984118d0b523250b9500a5da7eb3b51cf8696ca223f33a25d8c608e511aecf0f8284cf797f460f78022fb14ce3b9aee9f08b
-
Filesize
996B
MD5c90ee2ec5d7e970c76f2e570bf713d7a
SHA10879c5924bd966b0603d7d4a0c88fef18232a7e4
SHA256d6ac54c529adb94b87fa465e2af8179c52066a0b0d65a17102d92ced684ff08f
SHA512dc0b69832ec2ceea8386fec3c4666d17d4de040be6add84c1ae6c0502060b19bf3bd809bc1ddb76da17b65c93bfb5d4b9b2bf1d0bd54bda5144cfefe72f8ecaa