Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 09:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe
-
Size
188KB
-
MD5
2a70314e3cbe1e0d104b6093737aed3b
-
SHA1
434dfaba2abd0549dc36e71d93c94da0362781d3
-
SHA256
841ba2abe9ae03a658e08b74802eefaa5d10928954cfca3c3e51ae37a272a185
-
SHA512
c9e1d431d158132907f982fd71e0c5e278c8c0f473c0e940f28d8ed90d1d18af3412db1d903173f8bc8fa9307f43f3dcd06355a1848de3794b8d6e374b2139c2
-
SSDEEP
3072:y/59Bv2rGJQ1ylz/POFgqJheF46qL3Z3f//OoupzQfl8i9j:y/dvG40xnem6GZfexpM+u
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3864-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/3620-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/3620-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/4548-116-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/3620-311-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/3620-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3864-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3864-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3620-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3620-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/4548-116-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3620-311-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3864 3620 JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe 84 PID 3620 wrote to memory of 3864 3620 JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe 84 PID 3620 wrote to memory of 3864 3620 JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe 84 PID 3620 wrote to memory of 4548 3620 JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe 87 PID 3620 wrote to memory of 4548 3620 JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe 87 PID 3620 wrote to memory of 4548 3620 JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe startC:\Program Files (x86)\LP\E79D\A08.exe%C:\Program Files (x86)\LP\E79D2⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe startC:\Users\Admin\AppData\Roaming\DB6D0\828E7.exe%C:\Users\Admin\AppData\Roaming\DB6D02⤵PID:4548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD525a636a6190875b1c6e29548bbd8e2de
SHA16fd062f75c86fed0609f649d25118724f04d2899
SHA256b721ca3ae24634c7401d771b9ee783d790d3fa0542e48af1e277a31a28622b12
SHA51268040a6f48dfcb4a4e49bccaa4686a2acd3ababa69b76fe3258dbc43ea39bf13dd2b32db04459f33439fc194ef5d60d2b31a7e79b8d592023da322eb8d645498
-
Filesize
600B
MD5f4c772ee8297c2a3df3bae2aa6373937
SHA1597e3cbfef950df2028d3647ca7efe590224b3ac
SHA256858da5c65be56e4c3983c8b204aa005b73fd909fe4f30cf34bae00620fa813b2
SHA51275ad21052aef0897b14cd8301bce9ce66e0b72001af13c3f618a1070d8f3a149e93b5906e692a33dd64ca565a7ecae9cd1090093c9d324a0ac3b693a045a938e
-
Filesize
1KB
MD5e5037723cfb3cb3d3ee6299988136e60
SHA1c4a01bc8826adf2569d498c6ff5fea3142cdc1b7
SHA2565b168b6010e02e6ddd29542fbbadae2e08de06cd8f54734c6531485abb31f567
SHA51289737e7f0e2bc0107fa642e57f3d49f0640cb43db42916001b88703943680c5c931b9a0407ae3cb17edfb154b95a988905a1b940ee6382d36b9fa3f7c0a6dfb8