Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 10:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe
-
Size
179KB
-
MD5
70a7d9617402b6f535a6968c52cad98a
-
SHA1
3d345b22752a8ee71a5cc30c032852da6f99a087
-
SHA256
a4b7f34d146d1aafe9275c39e73b55131dbd3d1cb2025b612aff85b13a1a8e64
-
SHA512
fc09064f2c8d5e0a7b42ce1fe14deca799df66ef4b57f16545711922a82ef8fc6f87fb59098bc6e5bc7d17a4d2c1ce7462085b3f3ddbd815082cd349b881c054
-
SSDEEP
3072:JPKGw2PCiOWtD3qTsBih0pCKDuGCI3Byl/hsT4l5iilPI:QGw2PCiOWdlBih0p015iw
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1052-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2180-15-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2180-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1228-122-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2180-297-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2180-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1052-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1052-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2180-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2180-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1228-122-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2180-297-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1052 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 30 PID 2180 wrote to memory of 1052 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 30 PID 2180 wrote to memory of 1052 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 30 PID 2180 wrote to memory of 1052 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 30 PID 2180 wrote to memory of 1228 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 32 PID 2180 wrote to memory of 1228 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 32 PID 2180 wrote to memory of 1228 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 32 PID 2180 wrote to memory of 1228 2180 JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe startC:\Program Files (x86)\LP\658D\AD4.exe%C:\Program Files (x86)\LP\658D2⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7d9617402b6f535a6968c52cad98a.exe startC:\Users\Admin\AppData\Roaming\D5FAA\27265.exe%C:\Users\Admin\AppData\Roaming\D5FAA2⤵
- System Location Discovery: System Language Discovery
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5bd34805e322b782210a84e194b659092
SHA155431531123d934946643cc02ff156e5504a57f5
SHA256f99f6cf7d89c45feca8a0b4d874f1f0702c7cbe3e52471c8daee42df76a63047
SHA512b24fadf98cb84709cd7004e5fea08817fa92dd0aff437eea2bfb367cedc57dea2a756abdd3a75065c9b7d1808ee72c4cc665be302addc885456745621e7d0d54
-
Filesize
600B
MD5823822189f70da4e377d70d8ecd6e394
SHA16ce41fce3b57f139742d96a331665039e5fe4344
SHA2564d2bd1367dbe5f574a6034b74d70b06a4b58f3d1e13146d1183110def9c58744
SHA512fba2ad7bb29e4c5044e38b5a8fb2feb526f5718bd939f549e5e080991aab82b2a72fef69efd28ff51ad2b17328d453d5e0386a1322430d16e051f218b4efa3d0
-
Filesize
1KB
MD5b66c87d0488f761cb31253ee410c1cc7
SHA18dc2632acaef1a91437bfc37b63c5cecb39c229d
SHA256473f67e9b9ff8a03618882a47e4740ee2ca8911a9fd27fd10963e74dc1648e45
SHA512b298269ca667836d1720150e762c1683a71b80f921bbc9a6d5a545c83ccaff75616dee4b75253b5c7ea7a6309d1687eb10a8d6a580b618472f9f5e602934675c