Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 22:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe
-
Size
200KB
-
MD5
302351ebfcba77bd445c5c3be99b2ae0
-
SHA1
e4aeacb6b1033c77035d32e6e424ea076c983551
-
SHA256
b24fdc1f56b255cf669e947a4425c8ee4483c25ff8f1ee6c7e407f1a2d1b8528
-
SHA512
7b7cf28f70868654932e127e360cd2e266ce2fc153fc40d5e4f424d9cf40732431666b165aab304f55b9c928e36d9fc7d8c2965d72b6f590fe77c67e81c87d7b
-
SSDEEP
3072:wczKQqlNJ/wskbQjkx0ePX+Tbl6vbI1EHsKkCkhx+3NBbv5HYnP0QAGy6t:wcmnQ8jA00vAMf94NT
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2036-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3032-16-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3032-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2940-127-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/3032-298-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3032-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2036-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2036-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3032-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3032-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2940-127-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3032-298-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2036 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 31 PID 3032 wrote to memory of 2036 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 31 PID 3032 wrote to memory of 2036 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 31 PID 3032 wrote to memory of 2036 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 31 PID 3032 wrote to memory of 2940 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 33 PID 3032 wrote to memory of 2940 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 33 PID 3032 wrote to memory of 2940 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 33 PID 3032 wrote to memory of 2940 3032 JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe startC:\Program Files (x86)\LP\54F9\0A0.exe%C:\Program Files (x86)\LP\54F92⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_302351ebfcba77bd445c5c3be99b2ae0.exe startC:\Users\Admin\AppData\Roaming\9716C\C1054.exe%C:\Users\Admin\AppData\Roaming\9716C2⤵
- System Location Discovery: System Language Discovery
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD57310795831b794b236bc0a6376acad5f
SHA13eb6692f2347df3c1020fdb78a390205ac8c8a13
SHA25667de2263007d86c036d1e39ec5d0da79a47d516aeaaa1d82421a0c39f5f29eee
SHA51223a0a5cc4ba81addaa826f86998f2ee62162c84a78c646b4e6d05c99cdb1c695db01226759b63f4472db59da83b54b60b6ad78370730a49093f893368a8b27e2
-
Filesize
996B
MD5336d34e8315f2ba0f63ab3f5e5139cec
SHA12105b40449d15e1fb96a7d55e95ff984b3d5d469
SHA256b998076038746d29d075cfe991a6b2bce608dfc1eb9dd6e874d4ededf3bd8d43
SHA5128d80df19b30f8bf55b33c327c1e03cd2875c7338489d1488c34d872bf8448c40dbc9dc147cf315c431fedc0346b9f5503ef32c6f9bd4069e8c9fdd148e0ce829
-
Filesize
600B
MD5bb11ae8c19e04f44c02a9509d193e9b3
SHA19a7f1d7fc86958c69bd20ac0096fd593d4b52ad7
SHA256c75ea66040b53610cfa9456ef75cb9519c76d33225b810b9bb28c03bc7a7ab27
SHA512534786858f98ca2447a92f28da9fb9fda27a5bf28ed45af10fbf30f0383d606c5064084c1c9fe396044c1d63ec03bae1d6541b04914e20fbf6f426ac42552458
-
Filesize
1KB
MD597e1739f5cb0900ac1d0f45d0ce978fa
SHA123a2018bb1b22409cd921c78df828906b56e8ef5
SHA25604cb345faa2a8a1b7b02739fc1c9abff98729e0b09cbaf3ab3169cd21a419f95
SHA5124161d662800d1662e9cd04827d987a528a7b2795dc9857b247c488ae1d15dbfdee18538065599143e13ec93e87cbb084caf9ad6fa297b4a95f2ece72fe1c16f4