Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 13:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe
-
Size
187KB
-
MD5
5787714b5e0d7a8637009e5dd6a91a58
-
SHA1
549626c9602412bcd27712c44531ced2ed443200
-
SHA256
0d6bfde6fd87862c17ec21189950d9bf07b51793c704023f717129ec65b367e6
-
SHA512
0445fdfcc8a5c4963c7fd63f4b145bb55cdcc74f9972340b548b9b4cda51807724d9898e3846a1d300ef59be776dab71c14466e24b8a6dd6c770f5c66e7c03b4
-
SSDEEP
3072:is04FXKn40nNqekDdjvb9Eo7JjMe6i6V68fh0bSaJQtBZ2FoAEzuFKjVf1SF1KxB:isfFSqekDdVEo7Jj76lfOQtDYEq98x/5
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2916-6-0x0000000000400000-0x0000000000443000-memory.dmp family_cycbot behavioral1/memory/2376-15-0x0000000000400000-0x0000000000443000-memory.dmp family_cycbot behavioral1/memory/3024-74-0x0000000000400000-0x0000000000443000-memory.dmp family_cycbot behavioral1/memory/2376-75-0x0000000000400000-0x0000000000443000-memory.dmp family_cycbot behavioral1/memory/2376-174-0x0000000000400000-0x0000000000443000-memory.dmp family_cycbot behavioral1/memory/2376-179-0x0000000000400000-0x0000000000443000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe -
resource yara_rule behavioral1/memory/2376-2-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2916-5-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2916-6-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2376-15-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/3024-74-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2376-75-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2376-174-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2376-179-0x0000000000400000-0x0000000000443000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2916 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 30 PID 2376 wrote to memory of 2916 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 30 PID 2376 wrote to memory of 2916 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 30 PID 2376 wrote to memory of 2916 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 30 PID 2376 wrote to memory of 3024 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 32 PID 2376 wrote to memory of 3024 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 32 PID 2376 wrote to memory of 3024 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 32 PID 2376 wrote to memory of 3024 2376 JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5787714b5e0d7a8637009e5dd6a91a58.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a48817801b6815814ffe0f5b614d881b
SHA14cd3f805d19f89ca1a602c350f61a8896609d3f9
SHA256ca01657d3d6ffd06588b8b640db273c7d9f3f23904649c4b20e08b3c22563c35
SHA512d07b16e48570c846fc2468cdcfd34523dc6ad98389f7f13f17b4494b9607c7528d999575d9a615863b3b285f57d9279c43712be596461e7949f2c187a11e4024
-
Filesize
600B
MD54a57e37613aec8c047cf91beedd7691f
SHA1087c654fc2e66c4825970372dea5bea55927544e
SHA2569f3046e64948ea702a2fd0ad7ce94506f467c3f828fe7c33d241589ed81e503c
SHA512ac1f66da02da92bb20f1dbfb3a758f950ad86c0180ee2c828111093f6b3947ad047ef0d885e5d0586fbe5fc651f533f87e0150cc3bbdd4ee3712401a4f8dd66c
-
Filesize
996B
MD5f95d33aeddf02f81def492bb4ec16432
SHA199e88129786733bcd005fe3663f50dd66d141c11
SHA2560d84fc923d4a130e17eb274a6d065716003654fd22102bbbe41240f6b051f90a
SHA512b5161071041f6588ffd096f4a32c44ef44ffb16ab9dcc3f11c47d790eefc28df4e5eaaf8ad64cb07790689b6adb55e48f38403e332810e6450d277ac4cb643fc