General

  • Target

    a36d5c7da72073f9b44f382f23df9b10_JaffaCakes118

  • Size

    646KB

  • Sample

    241126-w1hv1azkel

  • MD5

    a36d5c7da72073f9b44f382f23df9b10

  • SHA1

    a7e8b1507bfb258a8efbbcc3bd72734f144fe998

  • SHA256

    2aba224a13f4d8602fd1f0e5f9373b3c958178bc79f51c34d0070a2742da1b93

  • SHA512

    4a7ce1a30c8b7f37f679b8f37d3e6e0995b2b2320f06743318bf0f79786d0d724d862583472dd6fc0327ee87b9bdb68e0135813a029f96267d94fd707fb11be4

  • SSDEEP

    12288:k/dr9yql7Xy+mO0FKUDTtMi1NzW/DaRMvNXx265syu4MrZ:kl8qNiyUdMONUzeosyu4M

Malware Config

Targets

    • Target

      a36d5c7da72073f9b44f382f23df9b10_JaffaCakes118

    • Size

      646KB

    • MD5

      a36d5c7da72073f9b44f382f23df9b10

    • SHA1

      a7e8b1507bfb258a8efbbcc3bd72734f144fe998

    • SHA256

      2aba224a13f4d8602fd1f0e5f9373b3c958178bc79f51c34d0070a2742da1b93

    • SHA512

      4a7ce1a30c8b7f37f679b8f37d3e6e0995b2b2320f06743318bf0f79786d0d724d862583472dd6fc0327ee87b9bdb68e0135813a029f96267d94fd707fb11be4

    • SSDEEP

      12288:k/dr9yql7Xy+mO0FKUDTtMi1NzW/DaRMvNXx265syu4MrZ:kl8qNiyUdMONUzeosyu4M

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Modifies visiblity of hidden/system files in Explorer

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks