Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
-
Size
184KB
-
MD5
cd1f60e33e97cfd8666442bbb73d61d6
-
SHA1
ef28dc487c4664fd5cc71bbbba2bd2d2af3ec991
-
SHA256
ca64ef74f5424656bc57a9131651785a69001634d0af0b1280c9101be48fcae5
-
SHA512
74ee00cf1026061c9bd9d1e8f6c21f6ceb626a80efcb73773b004376a8ffa3571e3dbed77c6af2f430ff8ffbcf084438a2cdabb4fd1465d8ac3fca0dcd38cc66
-
SSDEEP
3072:ZCo+5CqpKED6/yn+fz4d1urm7t0Mzkwt5ySg3hnPUJMEFwsrwQ3nqIKqKzEc2XP:Za3pX/+fzYEr2t3zkwtgJxIz9r3nqIKh
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/2212-9-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/4376-14-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/4376-88-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/3956-91-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/4376-190-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4376-2-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2212-8-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2212-9-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4376-14-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4376-88-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3956-91-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4376-190-0x0000000000400000-0x000000000048E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4376 wrote to memory of 2212 4376 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 83 PID 4376 wrote to memory of 2212 4376 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 83 PID 4376 wrote to memory of 2212 4376 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 83 PID 4376 wrote to memory of 3956 4376 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 93 PID 4376 wrote to memory of 3956 4376 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 93 PID 4376 wrote to memory of 3956 4376 cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD55f05005f503a5fc1ab0fa68ccdf53d17
SHA117d23c8dd31138ff82872139c403da5023a43521
SHA2566d308b37377e51ec63a798ac17f487fae3168f5ae93e421d20ec90a0131dee86
SHA512628d5032d9ce2fd5532e0d8adc354d0a93cbfcde56b5bedf26365699a775a85accfc1d46200fe299814992490cd332f5b4fd39bc2032ab814faa0b91fcd5cc6d
-
Filesize
1KB
MD5972f6ee256c94dfdf73137c8e8564b5e
SHA1c613b08594421d36dc6e859f3318801b53cc1211
SHA256fc35e7c2b1ae316b94fcb6bdcfff8a9add7474f8d5a1a1287ab55d191901c35f
SHA51295ce3f45dbeb08c4fc9acf95ae9b058f5136880bacb812053a1027f409c7de311cd2c8cc0c2d0fdf1860cf5f818856f53199e0dbb6e2c0ff5b7ecedb1e176b08
-
Filesize
996B
MD5b54626bfad6289a700c51809603af80d
SHA1ee2cbbb0424f45ea6e5fd831dec760ea798f23b5
SHA25609f9860e64c9161096076f3b2052c0b82b6fdebef18f17bfee577addb9f32ec4
SHA512453df8a3108dab207603f21c1aaf76a7c90c1815c369a32bee5e528991846e2ebc4b3a57aa374ea9034972df5fff1bfa9d91d6bc4c64baab14d9084b6cfab6df