Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 00:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe
-
Size
159KB
-
MD5
77113ccb7daef63288a4b67f481a0898
-
SHA1
26cf54642f629acc6746000830e4d835ba9fb97f
-
SHA256
56ded3162461dac583b7a58b101734cc264a429b6f745fb3dc9331c6e5fb9992
-
SHA512
8ed412ca863b3e86452a4342a802b8542f0ed6d904b13555363a6f28b54c2c862e0e4224639a15729768604ead8d397ea5642289f7204416336a7baf2a770be2
-
SSDEEP
3072:phQF6Mkng3ebcRlYE95SJjYcLCeJaKbWkCbV9iuw9Ccjxrmqf9WsrcZ:piFCwlyE9WTCeJaixUVDjcjxrmqAsk
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2084-8-0x0000000000400000-0x000000000043C000-memory.dmp family_cycbot behavioral1/memory/2028-15-0x0000000000400000-0x000000000043C000-memory.dmp family_cycbot behavioral1/memory/1212-78-0x0000000000400000-0x000000000043C000-memory.dmp family_cycbot behavioral1/memory/2028-79-0x0000000000400000-0x000000000043C000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe -
resource yara_rule behavioral1/memory/2028-2-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2084-6-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2084-5-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2084-8-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2028-15-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/1212-77-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/1212-78-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2028-79-0x0000000000400000-0x000000000043C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2084 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 30 PID 2028 wrote to memory of 2084 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 30 PID 2028 wrote to memory of 2084 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 30 PID 2028 wrote to memory of 2084 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 30 PID 2028 wrote to memory of 1212 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 33 PID 2028 wrote to memory of 1212 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 33 PID 2028 wrote to memory of 1212 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 33 PID 2028 wrote to memory of 1212 2028 JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77113ccb7daef63288a4b67f481a0898.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD506fc780e9ed4f06a65b828fd8ffe124e
SHA18c6bf062cfe4c922a2b6d5a77dc3c880ce7c609e
SHA2567c951d6bf638e169ac572998b0500bcbef724c0f99dcf98faf13f056c4198b4c
SHA512bdaf9384d296e60ec95e833970a0e752ef26016b15b9dbfc1c01dcd4f26bba8672ed50140883042a3c26f604bb5491734cbe859eb8a11b4ba6f368f1a2ca0945
-
Filesize
600B
MD52b582858b74ae602294ed3f50d2ad8c1
SHA1c6c13d2bfa77ce0f740c922a2cdc287c4b3a8101
SHA256792ec8ed14193398b1c2de5a94bbedc630457fca6289109914d4738e0a564216
SHA512de773d6774a32f8afa3194145ca82715c17c6d73f4a0ab2d9a8d4bc02023af5edc6ea6fae6aa846ff41c0b8cc8072954401757a27ad19b75ec08309daa1fc868
-
Filesize
996B
MD5742b59459b533949bc7626c92c226522
SHA1fa621f97503054ac25ab334d46e6a869a8b79018
SHA2568694c96d5e6ff6f3d12582d994a0dff50c29de6135d4c45735b479af8d259a73
SHA512d41350a2e046d9c0a45a295a061bbec7fb031a2f43e8da9b84aca0f8c6b2092f67ed634ce119aa6e507590b5a756d2378ef8719bbf52c22960d6ffb7e2f14bdf