Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 20:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe
-
Size
182KB
-
MD5
38bf2a8b1f4c73c42b9855ccd13f7c28
-
SHA1
2cd13b659691d29471e6ac8a61ef138ee73bb50c
-
SHA256
0eb2c8a34b7ba4e0abd4a6d94b20308d403e5eca5f90a8f5921821d4e58768c3
-
SHA512
63480544de946af4ff372ee0bc47abc32f9aff75dfe6b1541ff52df1be61e00221a4e90600fc9f15f0cb6318d133ea9f3d1f597d140df9ec0dd8a3984a39b847
-
SSDEEP
3072:QQEM79d98KzHVu+H6YzNwHyjKTqxBUpJs/gegsrDpV73QxrIUtxgX/LjnAB9ueJz:TD9d98KzIPqOHyjKTqxBdjrgJIUtiX/K
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2536-8-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1260-16-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1968-84-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1260-191-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1260-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2536-6-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2536-8-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1260-16-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1968-82-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1968-84-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1260-191-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2536 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 30 PID 1260 wrote to memory of 2536 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 30 PID 1260 wrote to memory of 2536 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 30 PID 1260 wrote to memory of 2536 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 30 PID 1260 wrote to memory of 1968 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 33 PID 1260 wrote to memory of 1968 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 33 PID 1260 wrote to memory of 1968 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 33 PID 1260 wrote to memory of 1968 1260 JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5821986a4176f3932472f09cb7293f28d
SHA1e81e8c7c1dd958d69130cff32ef99583f7a19fc2
SHA256268011258b5e8d81ad4b74911845c4cdff05da1808cf40ffb658abbe85198780
SHA51238f8dd91fdb3a202e175228957a65c58f47867f4082230ff30b47e6b09db0e47503362fbcdbaac6033ac0d177634b59d13884ea7c3d02063231c4d66f45698be
-
Filesize
600B
MD586ab49e53e1301be0e5dd4cee8799145
SHA1f0ebc454175fe800f748c9c426efb1b245d037c7
SHA25672b0b29a3b69c354b49b996e13311929cabed3be8e7efce1f88cdc60800e6f51
SHA51262d844386684499ddac7085707b20a0daa2478dc9a41cc8a7049ebe8162a901ac8fb9fca15efec3195dcf0174ccf9cfcbd3af09be4fa095e85194adb650586a6
-
Filesize
996B
MD50af247bf9d36e68d7943690eec262422
SHA155dbefa90df4ec9e43e925cb25d728fd21cf6e43
SHA25615a6c0e9fb2f04fcad0dd01436bf64f01ddd4c24297fb4b8f3d3c95d70fd0520
SHA512ded588c2fee22bf39da5259f095033b1d5e2147f671df5357f458d62412662fe8067df4b8e88cb8602355b96e0c91579e856470cdb738116af16970f7c3e6acf