Analysis
-
max time kernel
140s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 16:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe
-
Size
175KB
-
MD5
2d5d06944fee42a022a80ec116e95f0b
-
SHA1
f17e20da49e42a82a0a336ca57105d7753ec094e
-
SHA256
3fbc54a4a60d608803e05438a6f4142bb937013479982cdee8e8a769b87feed2
-
SHA512
eb444850c0c695d97dd783f25646608a8953a5223769c3cb662fe4b7a8b37be43820996c1916bc1124d5c9620ee6fea0e62f966786a2f36293e058d9586206b8
-
SSDEEP
3072:PJ3iQmKim4BBfIAD1XtfU6o9MnFJaYdhD7E8+TZ7KfQDJ/hH3dtSk2C4xUkKm:PJ3XmFBfIADX86o9MnFo8hv/+xK4D1hn
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/780-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/5092-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/5092-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/1464-130-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/5092-305-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/5092-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/780-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/780-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/5092-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/5092-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/1464-130-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/5092-305-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5092 wrote to memory of 780 5092 JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe 82 PID 5092 wrote to memory of 780 5092 JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe 82 PID 5092 wrote to memory of 780 5092 JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe 82 PID 5092 wrote to memory of 1464 5092 JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe 83 PID 5092 wrote to memory of 1464 5092 JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe 83 PID 5092 wrote to memory of 1464 5092 JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe startC:\Program Files (x86)\LP\A050\D7E.exe%C:\Program Files (x86)\LP\A0502⤵
- System Location Discovery: System Language Discovery
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d5d06944fee42a022a80ec116e95f0b.exe startC:\Users\Admin\AppData\Roaming\03FBB\71DA0.exe%C:\Users\Admin\AppData\Roaming\03FBB2⤵
- System Location Discovery: System Language Discovery
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD58c8d6bab01dc753f72be310bf622ccab
SHA15a344920c7c376b761bbdc8d61a4d6a124883922
SHA256af00f95e5960994ab11c3e800f84f6c20d20ff6a9e486dedc275e19a28cc0248
SHA5122c636fcde7e53e9cbf1a86e5df62758a88e8fb7427575d8a336e797ad46cde0fabaa50201001e145cf8067f6bd082e3227048e34378bc3ccff71c14db63a08b5
-
Filesize
600B
MD526856164f2c194e5d771a5f745e9f3b9
SHA11c911386d89eff2bfbc7805d515374a8c23fe504
SHA2567c63cb9a3b7f8b21aa02c58407abef6c3210a582010b0433b50907d4c676d1f4
SHA5121f0950b08d43eb80d6c8ef1f3ce7b379609abde258a623bd4218eeff3e9c7e6c6c13c76ef3339a195fa122d9e723efb7ec97d8f5ee078dfc4781f306066701a2
-
Filesize
1KB
MD53979715e46f69a1c2a9d5701965c83ac
SHA14d57778a0a9515424c59147cd89fb33f598115b3
SHA2560e56bf8bd346d86797fcc4387f7b1d66eb86be14efdad99cf5d87240d726377e
SHA512e89d9a68c4250a00255219e4d752da8c7391bae73d50f4a7aa9900d79ccb51775ac2604e57b8cd403a7fe1550e1eca9bb83979cbf172ee27ab4bd86e2ea9c2f6