Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 19:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe
-
Size
177KB
-
MD5
4e8ed2e7c364870ac53655f60d33a456
-
SHA1
3b68762065b5802606224ca4186d94ec7f0cf6f4
-
SHA256
0cada60a8b5a08ddcc6a833ce8b123d8c6812892ca5f0b0db4e9c911467a30fb
-
SHA512
8589dcc00dac810c167f2eb7841dd6e2a499f7389f6cdcfa567bd54e21c2fdf9fb00177f66a7e2cfff5a3f34240fd5d10e4f13be612782ed0b43c0489357934d
-
SSDEEP
3072:S/QZ7DGo+N8emCGQThMZh+OJwbMrLzdS5zYAFD1DQmGswlkmScw:Fqo+NfBGZwswMLZSJYAt1DQ5si
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2304-6-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2672-14-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/588-82-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot behavioral1/memory/2672-186-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2672-1-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2304-5-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2304-4-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2304-6-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2672-14-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/588-80-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/588-82-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2672-186-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2304 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 30 PID 2672 wrote to memory of 2304 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 30 PID 2672 wrote to memory of 2304 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 30 PID 2672 wrote to memory of 2304 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 30 PID 2672 wrote to memory of 588 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 33 PID 2672 wrote to memory of 588 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 33 PID 2672 wrote to memory of 588 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 33 PID 2672 wrote to memory of 588 2672 JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5943fe00b38ff5a9f3681e90e0f1639e2
SHA117fafccb3e920b0edbb3fca04cd4c13d2ccfd55e
SHA256d1d78910de2c3a504de725b0f554f1020024004656ba9034816bd18bbfb715f7
SHA51246f9deed50fb4463106c4d74a8b3b5b423c5bd7a1a37638160a38ef4a69b332aea20746ec496e7081f00d0b09c70a69eb8f86cedf1ae6a971498c7fdd48a4eb1
-
Filesize
1KB
MD5e52d9891c53eb2367e89c700b03207c3
SHA1e3e99c2ffa89a8d4fc6d169e0461581b7c6ab51f
SHA256d2497a80756bfa9ea4dae4b33325d9379a840e376c075f3ec23ce1b7ac302427
SHA512e5db7e0e3b1410a286bc8c7a58b043895971dacdff2182f8e855b12e99cf592e6c505e4962d6a7a9c171000627a8015e040cd11d12bc329786e5c8e456542630
-
Filesize
600B
MD57b6d320ce0385ec6f0fd15752f688724
SHA15963ef6dc7ba51078bc16c21957a1baf7ef4ba5b
SHA256075be43e9c2b48de26283b622dfa3578e60e0b2556a8aad132a88e73e2528747
SHA512ac53068714c5051b574585a22694fc06719a2f3aea39975bfe9db0695c1dfbe7b092aa54770fa14c3abbed261593c3f23aa10f92131886d19675da044eb774d4
-
Filesize
996B
MD59ae7a520c65064321085d64ef5a55213
SHA1c74240a8d757df4418a7b1cba25a498f30d3d1c6
SHA256831c9c7fca2c2a222dda5b5b3bd12b6e8b3020d1ad649eb9458cf0d1e123722e
SHA512fd7df8914199fdb2836e9453205b212ec8bb473e4fd0b211daabc62e43d4eb05e1f71b047f9696be21eab358ec985046cc7ac115eb7cbb4076e28ad7a9d8040b