Analysis
-
max time kernel
141s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 10:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe
-
Size
180KB
-
MD5
6186d864c5f25345d8c07d31d61846e7
-
SHA1
74a7582b07a04de1489c0ef1a4c6bf2bb8f268f7
-
SHA256
35e0e820ca195111cad0cae7538361c3a68eb612552fdf6c476adfc682a4e4da
-
SHA512
265992f61f980bb4f1fd8fb6b0db91b68a10bfe8b516629dfc49cb7a8b0e9a99b6b420cb5d72ea8aa0a297d6482faf43940d8be416a6caebbfd39bcd20a24451
-
SSDEEP
3072:inLbgwBa0lI9fWUPHeedkYD+YUz9epd3khvEgsYjMLW1o10n9ZpYdzk:inYwBlwWw154Ipd3R9ES1qrYq
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2964-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2592-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2592-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/3032-128-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2592-323-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2592-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2964-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2592-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2592-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/3032-128-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2592-323-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2964 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 30 PID 2592 wrote to memory of 2964 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 30 PID 2592 wrote to memory of 2964 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 30 PID 2592 wrote to memory of 2964 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 30 PID 2592 wrote to memory of 3032 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 32 PID 2592 wrote to memory of 3032 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 32 PID 2592 wrote to memory of 3032 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 32 PID 2592 wrote to memory of 3032 2592 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe startC:\Program Files (x86)\LP\88B4\5CE.exe%C:\Program Files (x86)\LP\88B42⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe startC:\Users\Admin\AppData\Roaming\4762C\AA988.exe%C:\Users\Admin\AppData\Roaming\4762C2⤵
- System Location Discovery: System Language Discovery
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD57a268acf77a0557664fe9e436ddc9a6e
SHA1dbdac5b4f81ced8cf5ab82e1bf99f05a19159542
SHA2562707d01b5cd39a7bf7e90d6d0f408224da425d8cda5c70c3c207acae4ca5fdbc
SHA512f6b0da5f3ef8f6f03cd7817451b10a451bcd2de9ecb34d8d1d50bcd255a21a7c2f030c3683c99036b3a8f9837aed5d39e9fa844c2fd860179f14aafd6ecef640
-
Filesize
600B
MD5d7263468b0cd458ed9eb77cfb1fda92b
SHA1b387422f148c71cd91010e2e80680689420d47c1
SHA25630d40dd5db863fe99bac7e88049b505cf01a4e23da0ee63a94575120b1e8cf0d
SHA5128bf0717c5138664805d9f28915ecbb49b9aa06165aaa90eaf37f10628c5933810ac43901eb4bca2d5f3074f7d66c71352f95575ec5a56c58b6d233b05fd6eace
-
Filesize
1KB
MD5131aeef0dc4a66fb9293410849e60a62
SHA1a9e69ad8679c4ad857ccd4569777ef83f7a3a7cd
SHA2563394fc03430f2dcf3eae3cc4c475d7fd0e39a7bdbcb71f80d1be9a78da5106c5
SHA512533e292a67b8fc2ba9e7b846977eabc6448d882f764e07e99865ee953ce5a38df5072e86888aa71b4d635cc667a93111ff6492d9ed7873825973466ef57bc3ce