Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 11:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe
-
Size
180KB
-
MD5
4a8ae46e15f3c189c7829e43a023f664
-
SHA1
63c6aa0923929b65745d4ba83ae16039d79681b8
-
SHA256
bebfe37c8edff65e3bace2e991a54af372b9677198c85ae778299ad4b64453fa
-
SHA512
396e2e5c2a565535ca1b6cd7d708baa72c432def534a576c04037cfa8a44a535f8d986a1028cdf5217b47e55074c1fa26e9f6b79fb03c7aed0b1b6c0fea2c615
-
SSDEEP
3072:raIMxroyFh6rnmXowjgpfK0EBrRZ0WvBY1QiGAojuJwBj4GLrw2bwvDY8s:r/8o5nwowafKjrLS1OCJsfVGJ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2720-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2244-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2244-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1748-124-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2244-291-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2244-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2720-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2720-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2244-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2244-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1748-124-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2244-291-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2720 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 30 PID 2244 wrote to memory of 2720 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 30 PID 2244 wrote to memory of 2720 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 30 PID 2244 wrote to memory of 2720 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 30 PID 2244 wrote to memory of 1748 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 32 PID 2244 wrote to memory of 1748 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 32 PID 2244 wrote to memory of 1748 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 32 PID 2244 wrote to memory of 1748 2244 JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe startC:\Program Files (x86)\LP\A50A\533.exe%C:\Program Files (x86)\LP\A50A2⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a8ae46e15f3c189c7829e43a023f664.exe startC:\Users\Admin\AppData\Roaming\AB822\733A5.exe%C:\Users\Admin\AppData\Roaming\AB8222⤵
- System Location Discovery: System Language Discovery
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD57388f2b6694429cafd0a2d99899a7898
SHA185e859d4afec12b59b2cf6ba0344ccfd0a4f1c93
SHA25685af9eb49fb0d08368f355775341f733c667932400bd172475671ed392790f93
SHA51282790a0fd4faf276c85e9fe511204f20beb21ca3b812a6b2075073891a8a3db5374feffb8157399a83f4d71ceb95b3790cc569678dc194058179063a772df528
-
Filesize
600B
MD5779e930ed8bc834a5106bf7df822c4b0
SHA1e0b15fc1895aaa7535d9404066430213b95fd303
SHA2566f1dd1a7e4c4fb27b56b18180c254657cde81eb0b3c18f320ef45c6700e24da3
SHA512fb4cfc6a3ed4a39b5a7f86a22472c8bc2b284002ff4af635a9d7a20b11b8ae35180c8b0bcb4b8a3ecb697e3e1b724e189b96f48365a317d0283c9b4524f01333
-
Filesize
1KB
MD5b1acbbd5b61104fed542ca4cf6e55331
SHA15e43e7a64e7b21bcda38534fea4d25e910b2869b
SHA2566aa9795141b4ad18a4f97b10f20c15aebfe0614c5d3106509594301ce9fb704a
SHA51273652edec2c8211376059ab55259b4a270307cd76599dc6a3b7f2a95930e028461c69362a3214e57b7b12d5b58766e571c28dd0902769d1438f833a0391d9ac1