Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 12:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe
-
Size
182KB
-
MD5
3f988b87a302eaeaf144e47c873a996b
-
SHA1
f6fd1d58d5c418e248389a9eeab068f801564053
-
SHA256
1b7b3d299cf781d70114c181b33de22d47bf20e53106c28969e83cc8d4e9b3b4
-
SHA512
385176c703cac543225a292128f329e33c0fcff38a5e1fef412e081d6c8abb0c4b9495b0457b4e2d0cf581c970f69509b4bc053d20c091ef85fdde97593e2c28
-
SSDEEP
3072:CupClVC5JKgLsLicBGBGwlnwASgDnkYb6HKbNsrXpc:C9l88gYBa5BTm/e
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2080-18-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot behavioral1/memory/2504-19-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot behavioral1/memory/2624-89-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot behavioral1/memory/2504-196-0x0000000000400000-0x0000000000450000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2504-2-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2080-18-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2080-17-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2504-19-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2624-87-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2624-89-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2504-196-0x0000000000400000-0x0000000000450000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2080 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 30 PID 2504 wrote to memory of 2080 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 30 PID 2504 wrote to memory of 2080 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 30 PID 2504 wrote to memory of 2080 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 30 PID 2504 wrote to memory of 2624 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 33 PID 2504 wrote to memory of 2624 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 33 PID 2504 wrote to memory of 2624 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 33 PID 2504 wrote to memory of 2624 2504 JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5f9f6b9dd612fb8d11afc4d856fa1f432
SHA124ba8dee6431a4fae9c41ddd0ed5f8885c4e1ba7
SHA2563a4c10210ae8b7a588245520df1712594e0dfb3249373375df7768ec47deb812
SHA512cca732902ea8a1d02e9e2d694771166074e3ee72b22863aa168366d1995eb197b01bd65094ad4356ef9884714c48ef4ff938bb02536833a62470cd54ef06ca93
-
Filesize
1KB
MD52a8e71277b6662281a74851c8aefbdba
SHA13efef248037b88da25a3ce055578f4aa90321039
SHA25661c87a48bc98f9af0b5c769298b4837498ccda4705a90ed590810ad1698d298e
SHA5121596ad73f9cadfe262a00692dd88af0266ffaea1ce8554dc300c2a7e56c41c0735cc95b4de4227d3f73d5e15758868ea1f9ca2929858bb2fb69270055d34f659
-
Filesize
897B
MD5da70c5a263e9177c3f0aaed3523c26c7
SHA1ac24478a82fc334153a21a1d2a6229895cc76096
SHA256227f72b05148da42ea975238010a490adab6e3338b47835905b9ff7c8aa1a61f
SHA51257ff359fe9795eb2025107ab5f3fabd00f23f04ae09a9345f15ce1b3f14d373781a3a85d94dfd05e6decff1a33d047f19a43d3583429363e174ad2458821f0a3
-
Filesize
1KB
MD5722330e3ec5415c3c5287dbced44e113
SHA1236e1a3286c8b60d425d3a875d1e8dee51666e41
SHA256f0767dbed4a250ca3cd1166c00f5955a5d37ba8a8196328598624e625e30571a
SHA512592165213436e9d1c47e67cbf782da65a93aaceb620272451fc15fc0a79a931ad9c7164e5d0d0a73c68e1a5f797a9d4b60520baf60e59fa19d7dde26636b397e