Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 20:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_438840a828a259f5191d80436faf37ad.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_438840a828a259f5191d80436faf37ad.exe
-
Size
187KB
-
MD5
438840a828a259f5191d80436faf37ad
-
SHA1
31eb51f3627d1fcdd3895cd5969cb77dba0c1926
-
SHA256
481e8252b1e083eef939cf57c6b1dd2929083b72a0517dcfa78243aad442dbac
-
SHA512
548759e865b2d15f38f67f400ee926ff2bf2b19806ee4e1f79eb44e411f24e449c86d05c356ca08af8cac5c342c30b7d5b3a66013363dd81a78d5f426438f253
-
SSDEEP
3072:crWqzy/iFj85uZvlywtd94jALUbM1qQpIDUPFdpyXkU6lxDswlRc3lgTX0PBxJ5G:c9qf5ue84jkUA1q6P3pydwxDs4RcVKEu
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4820-13-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4232-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4232-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/3820-126-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4232-285-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4232-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4820-12-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4820-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4232-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4232-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3820-124-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3820-126-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4232-285-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_438840a828a259f5191d80436faf37ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_438840a828a259f5191d80436faf37ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_438840a828a259f5191d80436faf37ad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4820 4232 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 82 PID 4232 wrote to memory of 4820 4232 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 82 PID 4232 wrote to memory of 4820 4232 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 82 PID 4232 wrote to memory of 3820 4232 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 83 PID 4232 wrote to memory of 3820 4232 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 83 PID 4232 wrote to memory of 3820 4232 JaffaCakes118_438840a828a259f5191d80436faf37ad.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe startC:\Program Files (x86)\LP\2D97\7CD.exe%C:\Program Files (x86)\LP\2D972⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_438840a828a259f5191d80436faf37ad.exe startC:\Users\Admin\AppData\Roaming\7B051\58F2D.exe%C:\Users\Admin\AppData\Roaming\7B0512⤵
- System Location Discovery: System Language Discovery
PID:3820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD544deeec7ab3df7b1ae2279803caf7c24
SHA15e1ffb94397298cbbb70f58abdb5d98d76890502
SHA2563c44f69b3982da951f6b26bc774c1ea281d4e14655bbf023ce38b136e9f9ad5c
SHA5121d9590cd8f1b0021f4340d36534bc0285c4d3cd4fad63bde9e18d254ec26638d9257eeea2f32c3d331991d926f10703c7dde6f7efbefd94c265171059404b4ef
-
Filesize
600B
MD5cc3e6142208950b488d8a4d5c8b3a070
SHA1c43d14ad3e4651fd1224699d9b0cb32d704aaa9e
SHA25670f8f02c96459869e35282d47633f8d91b3474307d80ef95a0cd136955444827
SHA51212362eac95a48636ff4581d65d0c09376efed4fa724408e78a5e250cc199c7fe859b91eb390b58ef3bb74c91d2b4f0dc8aaf8568e8ab82e5a4ea6863cc09064e
-
Filesize
1KB
MD5bad11a2432e721541b4a79224e9b3309
SHA1a72cae81137d71e77a6c977a3aff1f5a248003a7
SHA2562253277b00aa1684b9b69604aa832516b97da565541658775ac383e6b61fcb14
SHA512c779214ba004c4ec41080f47b44f6b24dc1c642878c91c08947ed611657fab509d24c30e378ee14a17801642c6b930b97dd94bbdb169a0628919e5aaec88251c