Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 20:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe
-
Size
192KB
-
MD5
38d0284f390540324bad53f4fd6a723c
-
SHA1
205654b5fe6e8ea6379fb0c02ac801515e9124ed
-
SHA256
0fe6a7d56da95f7fc6941f1a0ca462c2be1524bb2a999e5909bed73deeed7459
-
SHA512
732095c4ad9e541931f83113b26d28bf8e9059a5a4ba03c8be866b9df6abd469504995b49e08cd1183a785b77a76fc23daa6ee687e79c3a84000b0fc04bf6e46
-
SSDEEP
3072:SWtfAwfqNrriq/WkhtqLkiWWxw7R/zr/FJt/XqDXdl+sPT9troqn:XXqJriG7htgT0BJJtCdQsb9tr/
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1984-14-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1992-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/2660-75-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1992-180-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1992-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1984-12-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1984-14-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1992-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2660-74-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2660-75-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1992-180-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1984 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 30 PID 1992 wrote to memory of 1984 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 30 PID 1992 wrote to memory of 1984 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 30 PID 1992 wrote to memory of 1984 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 30 PID 1992 wrote to memory of 2660 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 33 PID 1992 wrote to memory of 2660 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 33 PID 1992 wrote to memory of 2660 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 33 PID 1992 wrote to memory of 2660 1992 JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD557a0706e6f8048fd77be83c7c6f11e96
SHA1989d7aa059768d751f3af1cbf0e68eef855d58ba
SHA2565904aeee498e4db3781b259be857a5c6fcea3751c500ae30b10e1c944e64ca45
SHA51275d10be798e4516508a9aa451d591c75be72fda4da307693fe24349292efae875811467675cfc0d33cc26ef95023ae4614e18028a11e8be5110f052deef47430
-
Filesize
600B
MD575321ef99cad868018395cf18d6e0528
SHA108fa290a8090f9d78ec8b47bb1d91ce1d71b25df
SHA256f4bdba35418c5cb66c00f4f081c3839fb272e4b8ffeaf54ace76962e1196e2cb
SHA512ad0c9588a0debb0a6410fabcc970758c8bc554ab9d52c5adf03f827f148497251845f9c1fa4aace5927fa953fcbfb166ff4e00d1693a4ccb0ef00c4961fec7f1
-
Filesize
996B
MD5f2dea45ea9e5e9fd662170d82a3b679c
SHA1357e1d2e463f867d1e7107898d702bf94e34ce6d
SHA256e41f1875717e8b0daa341d6679ed078a85dfbf2617618ed5556465e82f89da78
SHA512e3815036892a1ffdc742646901b7312c4f1411209cf031644764f1f561db7978588d336cb3bde33fdd130f8d0dadf2b0057d381090266d57528f0b0abd4d1d23