Analysis
-
max time kernel
140s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 15:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe
-
Size
175KB
-
MD5
4ca68bcb4f7534bda135b8c0faadb6de
-
SHA1
e369eff20ac6ced7b390d4b2ad3d12a7596f9d4e
-
SHA256
634640d05939c5e3043a290eb6347fc027c88396ff3e84068bc9fd728322312b
-
SHA512
71414ad7fa589f825c3fe82ed470b8496dc2a6b4c861060f019c6b5ba1356adf395faabb0658f6872d57aa1734773820092c259189ef1a8af8f76668859aa05d
-
SSDEEP
3072:MHPMWaUGlVVA7AimxbMe8g668A4Km+u+vnL3KAmH:OkWanNA7A1598/AqPSI
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2884-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2108-16-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2108-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1808-120-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/1808-121-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2108-276-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2108-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2884-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2884-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2884-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2108-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2108-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1808-120-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1808-121-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2108-276-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2884 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 30 PID 2108 wrote to memory of 2884 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 30 PID 2108 wrote to memory of 2884 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 30 PID 2108 wrote to memory of 2884 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 30 PID 2108 wrote to memory of 1808 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 32 PID 2108 wrote to memory of 1808 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 32 PID 2108 wrote to memory of 1808 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 32 PID 2108 wrote to memory of 1808 2108 JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe startC:\Program Files (x86)\LP\0483\FF6.exe%C:\Program Files (x86)\LP\04832⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ca68bcb4f7534bda135b8c0faadb6de.exe startC:\Users\Admin\AppData\Roaming\31AD0\BE204.exe%C:\Users\Admin\AppData\Roaming\31AD02⤵PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5be31718859b1cee9f4d4296d32c9a620
SHA17f8166a3be05d3efe24c4873229e7a6539b34d2c
SHA2566791690f5e27cc3bb16c10dc42dc663a21b4c3ec82e1da60a0371dbb1b389fec
SHA5126e01df09d6270b7410da20091103dc1b4d0596f96866dc4bbcdccd043ed9d5ec3077e400f9f3c8e1a53a2b38afdbfc148202fe4fa427ac34bbc4af7a6426bcc4
-
Filesize
600B
MD505a7e90d07077a0d3209ceae5fdb6384
SHA1c8e79e3eb6c26c5f20d15700f3f2430070afa220
SHA256bafc2e9b29d32c8f6e3143c802d1b0000c837ebf3f3bcec0e4f2a5565cabd948
SHA512c0c3726a156b5cd5830cb1803bfe7b455e4a0f2d04d82c737df5001ea5f62d534c3bfb5d5ef4c2339564c583d65fba30674c2042dd8cd8f95a6fdf57ab946342
-
Filesize
1KB
MD5e3265e8225ef21fb1dc0a6f6961cd975
SHA16d946cd47f12a34991f51ec8ba5082ecb580bf17
SHA256937ee979d676d22cba9e745db6e39902ec8c5ef482d84818b785a8f2fcd10c10
SHA5122354f09508856513c49fda4d2617bb3cb097d32de2a2039ba11f2f618c2ab76582f0ddf2f27ad4ee8e8868e8aef4c3e264ed5fadefcc292cd080f57dfe62227d