Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 20:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_438840a828a259f5191d80436faf37ad.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_438840a828a259f5191d80436faf37ad.exe
-
Size
187KB
-
MD5
438840a828a259f5191d80436faf37ad
-
SHA1
31eb51f3627d1fcdd3895cd5969cb77dba0c1926
-
SHA256
481e8252b1e083eef939cf57c6b1dd2929083b72a0517dcfa78243aad442dbac
-
SHA512
548759e865b2d15f38f67f400ee926ff2bf2b19806ee4e1f79eb44e411f24e449c86d05c356ca08af8cac5c342c30b7d5b3a66013363dd81a78d5f426438f253
-
SSDEEP
3072:crWqzy/iFj85uZvlywtd94jALUbM1qQpIDUPFdpyXkU6lxDswlRc3lgTX0PBxJ5G:c9qf5ue84jkUA1q6P3pydwxDs4RcVKEu
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2800-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2772-15-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2772-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/860-119-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/860-121-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2772-299-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2772-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2800-12-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2800-11-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2800-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2772-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2772-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/860-119-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/860-121-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2772-299-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_438840a828a259f5191d80436faf37ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_438840a828a259f5191d80436faf37ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_438840a828a259f5191d80436faf37ad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2800 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 30 PID 2772 wrote to memory of 2800 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 30 PID 2772 wrote to memory of 2800 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 30 PID 2772 wrote to memory of 2800 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 30 PID 2772 wrote to memory of 860 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 32 PID 2772 wrote to memory of 860 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 32 PID 2772 wrote to memory of 860 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 32 PID 2772 wrote to memory of 860 2772 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe startC:\Program Files (x86)\LP\9FD4\CF5.exe%C:\Program Files (x86)\LP\9FD42⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe startC:\Users\Admin\AppData\Roaming\4B095\2169F.exe%C:\Users\Admin\AppData\Roaming\4B0952⤵
- System Location Discovery: System Language Discovery
PID:860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5bfeaa20be3230873df490197618da0be
SHA19f568fec7427c11eb651cd3c6efca309fa169996
SHA256b477892a20f482664d0038bb48a754f6236c7a422ef84ab81bff0fe5b1091341
SHA512e5925fdfaf0d3b8370632f74ffd716a7c882ea3e4804f45a627e32b5130a29d58138ad2a3494f20c45598dff11d8fe14aec9d27cca093bfc9748017ae23d2897
-
Filesize
600B
MD592d5aac27cc860729fd9d390dd0e0722
SHA172b7c7dbb01030c8fb33f8805e305c0bee0edf19
SHA25644e4cf20517397080ec004c31e2d324614be3f24df755c65496ee1aa0f56b28d
SHA512858a3491e846afec4ed626b1ee0727ae153032c59d2ce82b95f718d4e7041a8eab691064ff4713e84d42bbc66017028edd0159593e394d43daafed2b446bd54b
-
Filesize
1KB
MD5a5bcc370293b6a37e22554db07dd01e1
SHA1077e3fc11870686c2d7a2edefa3d953f58cc9795
SHA256b0e48cffc3057d811a889d955a2f9ae010ca2e2240a301aa6abc24386d0c38ab
SHA51264d3e0488b02a5b8c623e49c06af932cfc69a5d7972db7a6a939c72f98b97de15ee1287669c89b83dea1240467c2d84bd7381668d8d80cfc8a81dd654fa26b9e