Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 19:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe
-
Size
181KB
-
MD5
4ea7c83f425b958d086c6e149b974a0e
-
SHA1
6d4c206279b81d345958cef89abfaefd8bb51093
-
SHA256
4d9069ca45891daa6d531429ad3bef9e8f8ced4736531096cd6ef8ea1d236981
-
SHA512
5f6c4d9ec9f04d747f77be6012ef093b9eed5c83f26867ef504640420da03509698a34d25ef86f1804d80c3dd5acac772ffec10caf36effee7e93ea397a06a6c
-
SSDEEP
3072:UrSqBxddn2ypl4dYt7ieXGGXmGnWA1FCDsh8hvU6clb5OGg4p/UQ7S5x/b2Qhl0:zidd22lTieXpWGnWA1Dh8+5b8Gg4941D
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2120-15-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/3016-16-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/3016-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2956-111-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/3016-274-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3016-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2120-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2120-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3016-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3016-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2956-111-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3016-274-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2120 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 30 PID 3016 wrote to memory of 2120 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 30 PID 3016 wrote to memory of 2120 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 30 PID 3016 wrote to memory of 2120 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 30 PID 3016 wrote to memory of 2956 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 33 PID 3016 wrote to memory of 2956 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 33 PID 3016 wrote to memory of 2956 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 33 PID 3016 wrote to memory of 2956 3016 JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe startC:\Program Files (x86)\LP\5749\582.exe%C:\Program Files (x86)\LP\57492⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe startC:\Users\Admin\AppData\Roaming\90C21\74457.exe%C:\Users\Admin\AppData\Roaming\90C212⤵
- System Location Discovery: System Language Discovery
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD539b81b94269ea3629443d64fae5b25d0
SHA19f18622e87a5dfcd9107736cb49647939f5e4d30
SHA256cf127b47f3770a747e598c29e79a4799257c359445ed29983a7ab58de0b3fa88
SHA512eea075ecba1bdcf42be858ede3112d00fac35a6fef1aa08730d2b1d740f369a84ae5dfbb790646b091295bfe673a1bc6a61bd8cf09d73efe6fb20ba42536db9b
-
Filesize
600B
MD5e0e8211e508a62a9410a38870d0f20d7
SHA1af33bb68fa7aadde19ffe1f805169623a41ddeac
SHA256f1573202e16a3696383739807b81e471a702556fe1fbdb341c8cd4bed847c3da
SHA512160eb3ec5b98bd4d5471997a6636a8e4c8d1ed46ca8498ddc4cfba079810e308ac1885bc1203ab98e9307f673ba3a76273e619239137aaf51fe3b198453f702c
-
Filesize
1KB
MD5773417c0b96bfb4a1bd36a54c8f526ce
SHA196dd52c1902aaef64de613c8e8637e9b1e68dc98
SHA25675c76e697888cc4092285be6ac0c89ff619794a4909b2904fa9fedc757ef17cd
SHA512038814be15eabd064dae0be8aea00e8eca8c3e92561d67e9efd82ffb1a71abbd7e42757617b34bd56f0e6f406133a2b1e8007043103ae7646bda05e115fe7b19