Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 03:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe
-
Size
199KB
-
MD5
5e67cf5099e201c63b5b5d32cdebce33
-
SHA1
2bdcd25e8988254148e5dcf5949f43546559d81a
-
SHA256
113414ba40e0cf76e2b5ab71419e30fda53d1bea7bb918962fc8c12a84746a1b
-
SHA512
d1e77814726fef1928742b41ff6f7a60cbf304c6cb8cda8ec336cf32a622fab97e8fd804eb2940252cf3eb53403bf3c56b1e5d82f3f2d2a8c73328cc4c15e140
-
SSDEEP
6144:SBd6Qler5cPh7y39r4RG1ifLgeJrukaQb8H:m8QlpKriG1ifLg+Fg
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2428-6-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/1968-13-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2484-73-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/1968-177-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/1968-214-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1968-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2428-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2428-6-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1968-13-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2484-73-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1968-177-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1968-214-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2428 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 30 PID 1968 wrote to memory of 2428 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 30 PID 1968 wrote to memory of 2428 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 30 PID 1968 wrote to memory of 2428 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 30 PID 1968 wrote to memory of 2484 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 32 PID 1968 wrote to memory of 2484 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 32 PID 1968 wrote to memory of 2484 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 32 PID 1968 wrote to memory of 2484 1968 JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e67cf5099e201c63b5b5d32cdebce33.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580ee89a3f0544192182b115519071dd1
SHA1e8cc016016e2335bfb03fd362688381bbf27f489
SHA256c4c8d64012a15c67d5661bf1b1d3d470f88a45d6a3606b0d4df62ce3d7c72c60
SHA5122f51147496d61e155837f11f588b69add7739d82828d05be4d26044e8c829cc72a24c4b733c13de2df1e5c941944cfcef69945113d54a7a6dad5e8f51183ba10
-
Filesize
600B
MD598fd98b708b2443e37569b076cf91cfd
SHA10c4698e4b7dfd2509121f8c97f19e434125556f8
SHA256115c017e7caa343afe48ab9f2bf6f305136213524ea2bd4e9c7eb8592555bb99
SHA512e1d0946f2d9b97fac6aecd253e178a8ec0709a56b903aa1bf274569f385979989c48f4d355c81f35cc12206b97d33471b20970022b44d60b2aec4efc0c170971
-
Filesize
996B
MD51d580d0d8dfabf631d2792b2faf425f9
SHA1e9687da932773cb776686f5fb75fbecc3f2ba117
SHA2569100aba062e23fb5d0cba82ff9ce1d867f082f191a8677290e3830a0ee08e111
SHA5127d1b5e2634528e54fffc462c6a06a80d0af4137420d4f4060162ce326453048e261dc832970ee8859b27dbc19566d2daf72431fac6f43cf25e35c367bca004c9