Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 10:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe
-
Size
180KB
-
MD5
6186d864c5f25345d8c07d31d61846e7
-
SHA1
74a7582b07a04de1489c0ef1a4c6bf2bb8f268f7
-
SHA256
35e0e820ca195111cad0cae7538361c3a68eb612552fdf6c476adfc682a4e4da
-
SHA512
265992f61f980bb4f1fd8fb6b0db91b68a10bfe8b516629dfc49cb7a8b0e9a99b6b420cb5d72ea8aa0a297d6482faf43940d8be416a6caebbfd39bcd20a24451
-
SSDEEP
3072:inLbgwBa0lI9fWUPHeedkYD+YUz9epd3khvEgsYjMLW1o10n9ZpYdzk:inYwBlwWw154Ipd3R9ES1qrYq
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1132-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/640-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/640-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/3952-136-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/640-315-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/640-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1132-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1132-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/640-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/640-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3952-134-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3952-136-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/640-315-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 640 wrote to memory of 1132 640 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 85 PID 640 wrote to memory of 1132 640 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 85 PID 640 wrote to memory of 1132 640 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 85 PID 640 wrote to memory of 3952 640 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 86 PID 640 wrote to memory of 3952 640 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 86 PID 640 wrote to memory of 3952 640 JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe startC:\Program Files (x86)\LP\0069\6C0.exe%C:\Program Files (x86)\LP\00692⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe startC:\Users\Admin\AppData\Roaming\9D71C\B5600.exe%C:\Users\Admin\AppData\Roaming\9D71C2⤵
- System Location Discovery: System Language Discovery
PID:3952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5e46905737673b61ac4dbfa57d81daf0d
SHA18147e96b8af46c9d53f77c0ff295e76a764cfe7c
SHA2564cf55c3b31deca0b840b1493ae3d93c48757db4335cbb15cfa1a06113df648db
SHA512f63a29af70ab132303123d31d281048be018dd192f0c4dc1de148aaabf65dc443218004c7cb9a123c03123aeaf0f701e13b6246bc48b673502a72bff74dded5c
-
Filesize
996B
MD58c990d3ef4f7a406115c0f14afab93f5
SHA189e0a0384da8d35e5e8968d0e0f7e570d3041386
SHA256fd96bcb2d34fc216a09d5401aba5e8eeb9dac83fda990a820afd690699fea5fe
SHA51283be9c79039be3f5e994f15e7fcaa4ea0d2a77e4e1028eabf0b6229f0d4a46dd199e30dfdf017cc34e4928c311bcdd388be591689b16f89313ec30c8ef4dcdde
-
Filesize
600B
MD5b27ea5aa0499ef4057319f431af278b2
SHA1d737370381493db1de92d129edb14b70388eafa1
SHA2565049676e9d6e38a1c23fcc9c7c57294e205a88feac398577aa09a84c6259e067
SHA51263fae56db41d646e517b06916d9c85a7b258d54442d69b01e84232de434fb30c020b0b232c1a641ff64034b03bafead725abdb8b8af459b8b7b0334749e1fdff
-
Filesize
1KB
MD55c69c91e9e9a5d2e4d28f2e724dffe85
SHA14ea4c7ad7568a784c02a10597a0e4e22080da0ff
SHA2564482a10e78fbf6406ed3cb2e35363145c74382ef6e398324c7e6f2195434e97a
SHA5128ed23cb8a8e74eb546124bbc72e536edaa5599ab386e4d3c0651760a200f7bcc6b2dbb44f477786c39bde323708b92dbc258342c021e4c65e7a54490f2f228a2