Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 22:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe
-
Size
200KB
-
MD5
76446975071b3d7bca4551b4a9fa53a5
-
SHA1
22ac8497f32e8aebcc95a174558265917ca07350
-
SHA256
786aa1e9f98fabbcd356c1cd1ea1c5dd115d33bbfa02d140391247c66dfc45f3
-
SHA512
7df707885ca926145a1220d8a385f88e3d404477681e6ee333ae028070badb1abddf3435b7452bb0c0e64382ef550ad16930fdc36bd648018bb99822a3047d82
-
SSDEEP
6144:cZilzeAzEQJFqNU407ZrZNhuuqEMqstq6y0yLMs3:KiljzvKNyBfhuXEiCFL
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2728-7-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2732-15-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2032-80-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2732-180-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2732-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2728-5-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2728-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2732-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2032-78-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2032-80-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2732-180-0x0000000000400000-0x000000000046B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2728 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 30 PID 2732 wrote to memory of 2728 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 30 PID 2732 wrote to memory of 2728 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 30 PID 2732 wrote to memory of 2728 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 30 PID 2732 wrote to memory of 2032 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 32 PID 2732 wrote to memory of 2032 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 32 PID 2732 wrote to memory of 2032 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 32 PID 2732 wrote to memory of 2032 2732 JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76446975071b3d7bca4551b4a9fa53a5.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5471a50b18f6bf31449533df7da65587e
SHA1c85e58cfd5c03916c7e6428a879ac1ce477b4ea0
SHA256b8c55875fa08ca73ca9d3b6b0a4f5d7bc34baaece0f5b3660eedf393d1cff77e
SHA512baaf8106d877344e1255ae417ef9e32e7faf19697a18c753b04daba056c1d640b258a70ac6705d0e57ceb88fc75f8bc9772ca0f3c50b7ea6376999217494509e
-
Filesize
1KB
MD5658ae73268ef0a968e1a67026e6a850a
SHA14b0fe2fc5302ee2daf305e55acc8564211deab1b
SHA25683b0dbbb49d3fa7aee65a0fbbcb3b2049f64d848e1ad5b85b8f7f1abc01d5827
SHA5126688414658adba83b5e9cf0dfb6d9b9ff9abf592480e558c6ba8d405acb8ebf801a900bf7fdfb0e86f12eed394efaff77e668b4303f74f65bf1561c22f56dfe2
-
Filesize
600B
MD567736d40862fbf09f3aa6e722fe12b26
SHA1f782a3c3b0821dd7067ffe92378d6ca0d8ff44af
SHA25681d93e6de8733726c076bdfc7261c6cae9d1bbe10182083f9a34550b6f23ec55
SHA5123b85d1d9688b12ebe45598a3e5ac589366175ba53523ecdf4b0380972562550893faaf68ac3f917391e295a9e16df4afb839cf507abaccb03e1b6c8b17357e56