Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 15:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe
-
Size
192KB
-
MD5
40e01e24f7f6da6f3a53da50e54f9187
-
SHA1
a4f70eca299a2bbe9c238d3b35ba6eff0e7c7fbf
-
SHA256
d7e0f5af93d083b9346ee2c4cd6b972f2c597b14fe4d4e4db8eda5b4fd30a802
-
SHA512
bd0e6bc15b73f59b154dcbd003510fbe2ad03ecc8bbf3f5bad830667e9f742612c521d5c010f6ef1bbc881c7fd6d2aa761188a12062fecf809518e03d3ee13d5
-
SSDEEP
6144:UjW8x6XKUCuxWNLw+i8qo1InMybISNqm5:gxApW18bL5
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1152-9-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/768-19-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2672-81-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/768-173-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/768-202-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/768-2-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/1152-7-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/1152-9-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/768-19-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2672-81-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/768-173-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/768-202-0x0000000000400000-0x0000000000447000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 768 wrote to memory of 1152 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 30 PID 768 wrote to memory of 1152 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 30 PID 768 wrote to memory of 1152 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 30 PID 768 wrote to memory of 1152 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 30 PID 768 wrote to memory of 2672 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 32 PID 768 wrote to memory of 2672 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 32 PID 768 wrote to memory of 2672 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 32 PID 768 wrote to memory of 2672 768 JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5abffa1a36e845bd332b16af686ad7867
SHA18c98daaffb08e24f1c30ab4f4851d5c732241ea2
SHA256db80f640a5ad7af07938abfec9143c3d3421fa521e250f8e375d31dac4696de1
SHA512516b34d6507bebef41d07f84005b21a6ffbdf2381ac024a92873b64e79ad5868d891fe4a596f8092e77fccf7d741e82619f05bf3dc26028d4a7a455b80793fdf
-
Filesize
1KB
MD5a4dcd3b986351041fc4a905d287cdfe1
SHA11af2449f099111f701f40397ed28b297694bbd35
SHA256c5553fccfcd862f531e78cad2b5fc7b943e6f97c504a0846d2d76700dd9c7992
SHA51270219a5ffa1e7f70b16af1c7db490b4b3c423d324293710dda6f244285c5c73edca57e2cc553cce0f2bbc7e6f946f504d71e079f8922c482e7040d6817d7adb8
-
Filesize
897B
MD5204f8cc7efa96078ff3c6a120ef56e60
SHA1fd5a1e6e07a0f8449c62e91a4842a4282eb94a42
SHA2565aa946bdf2718379fead7b0b292c174fc14ddc36804e21fd59a1ff421ffec6a7
SHA51289a08ba90bdce4b710dd0e6b391b1e7a4dc09289898faba479009168962c7f523e97d6c9fc50a2f470e2e1241880be2600581cc3d858ef46029459bdddb9d15c
-
Filesize
1KB
MD5fc059723af6a0ef150e4c7ac60277cc3
SHA12bf5c757f1ffac49e6e08ab659625a40d0f6fed1
SHA2565c7242ad02e0c61038654d9c906ca373446f3fbd4e0eecef8dbd8da537bfb12a
SHA5121551d30c886e59b54866296552dd120d2eb6a2a4342d0ee764d4c933addef00d577fa0d5591ac22173b6cbe5ce1b57cc9887d8eca3f86278c996bb58a681284c