Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 04:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe
-
Size
174KB
-
MD5
4712593ccdbeac886024d6aaa5172b21
-
SHA1
4b354b96e624f8ba14876cd358c4d5202ecd289b
-
SHA256
618bbba57f1cc3ec7bbc4dffa1ed9a626141443ed7933c284f90019b70c8ea92
-
SHA512
9b3797700fbc7d1dcf38484f63cd16933df231e1fb6dc91f795532afc5168c240b65e32b5ee42929f1f1c895b67758979f1207681c2df7c6f64051ee291a89e6
-
SSDEEP
3072:LO0iK2/TuDH6w/KycOtx0OaUI07WJ30gI7E0sy1wiZwhAlvJul:LO0iKguMx/ODI0aWgn5iZwWsl
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3272-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/1984-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/1984-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/2324-135-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/1984-302-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/1984-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3272-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3272-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1984-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1984-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/2324-134-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2324-135-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1984-302-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3272 1984 JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe 85 PID 1984 wrote to memory of 3272 1984 JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe 85 PID 1984 wrote to memory of 3272 1984 JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe 85 PID 1984 wrote to memory of 2324 1984 JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe 86 PID 1984 wrote to memory of 2324 1984 JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe 86 PID 1984 wrote to memory of 2324 1984 JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe startC:\Program Files (x86)\LP\4B04\561.exe%C:\Program Files (x86)\LP\4B042⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe startC:\Users\Admin\AppData\Roaming\49A26\5794B.exe%C:\Users\Admin\AppData\Roaming\49A262⤵PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
596B
MD548fd04b5c640c33e655f5cbd2d89e79b
SHA12e8fbd83612412f7a86f09d44bf5a004496861f8
SHA2567dcd595250cd7307d8bbc9a2f3a2c4807935225b6ece474f97c78b1e105d584c
SHA51299ced056f1a6a9f4ea7b6ecec739972951832ec1aaacb6d044947768e6b42860c62c7d894c7b8d1350172f19cd566232958d4fba494eba13a5de63efc9b70928
-
Filesize
996B
MD5fe63b072b92338c9a0af923ac29df860
SHA1e40d5107e442fab6bea9cadd89f9acbc886d616e
SHA25645991fb0d41047dd93e3064816abfb02ac8b9d0443fbe61f758179332da12de1
SHA512b4839be220bdb54b23ae1923602d3ab9b66468aaf1d1dc63dcb9cc6b8cfa959d7ee81a10fb2bae9c18d65fa12654e84a680c72d4ea11b87fd7e724bf15a05d4d
-
Filesize
600B
MD5e180d51e3606a6de6e5a18df97bea6ae
SHA1e505ac4e3270fba105461781134d339e96ea58df
SHA25689775b0115cc38696b421a4381698066f1b1e7ebee1e6f55b87c09b84bd452ac
SHA512ee04c0b72c274585b8b0b6c2557a6dc371507af6c4e308911e0135f253eb305238f98730ed3e8785a6833fb2ec745db4eb478a531cc62350f09ea099842a1a50
-
Filesize
1KB
MD5650ffb476b7f3fa1474eb2630c450d23
SHA1f8d724ca0f79732a34e58df34fd4c90b6e4bcccd
SHA256d799250670f81b9612df5f395bead0ac379499819d9c79f696134b71372012cd
SHA51253598ae39e3b3dc43d31cda13d4f1724b676e753f640f9a698e50c3b34b343175436ff497b29080906e9e8f795e32f2f192f6e1d431ba744cb41292738cfd30a