Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe
-
Size
172KB
-
MD5
d8d429f967e2119013210ef155571d1a
-
SHA1
1f04289404930e79583345fd555d36f54d13e709
-
SHA256
580ffa3d517ceb84f517877492ff44416ba1418d746fe676fb7b7ddb97b5e2a6
-
SHA512
9109f865dac4310bc33fdf6fa6c098829334a642638f0031041e551f40d3240fac4c63f353c92372a662985231cccc6f235eb452508c9f601df0f5e5034afb34
-
SSDEEP
3072:Pgqw8FIL6q4hrpvB5KMcpnK2W5HoA9jtxG6fgYA31UBrKws:Pgqw8FIL6nxdKM2KfHHjnIxOBDs
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3556-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2784-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2784-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/2804-121-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2784-122-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2784-300-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\3111E\\FCE24.exe" d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2784-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3556-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3556-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2784-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2784-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2804-121-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2784-122-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2784-300-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3556 2784 d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe 82 PID 2784 wrote to memory of 3556 2784 d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe 82 PID 2784 wrote to memory of 3556 2784 d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe 82 PID 2784 wrote to memory of 2804 2784 d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe 90 PID 2784 wrote to memory of 2804 2784 d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe 90 PID 2784 wrote to memory of 2804 2784 d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\d8d429f967e2119013210ef155571d1a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe startC:\Program Files (x86)\LP\24B3\C25.exe%C:\Program Files (x86)\LP\24B32⤵PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\d8d429f967e2119013210ef155571d1a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d8d429f967e2119013210ef155571d1a_JaffaCakes118.exe startC:\Program Files (x86)\1E2D5\lvvm.exe%C:\Program Files (x86)\1E2D52⤵PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD501a1e4d24635a9407ff5b679a355613e
SHA19819b56ad4286ae0c970a519d3280976e11c56e6
SHA25673f7f5ce155380f6bbba7aa49987f64c4f63a906a66b2bbd89745f43112bb051
SHA51281de234e087408c4a335b2b0fa6cd985585ebf7ca214bea882a40e7f0f8379a62a0ff79a23978e62fa2aa126574f1d80c8a2fa55177b978e32ebc96e9259f1ae
-
Filesize
600B
MD515c302c51abf0373a621a5f8a8c1b428
SHA13369ff4797fa2b64ab6149d6c70b4d3d4efa8487
SHA256e6144feca07b0e264172f0bf9678e5ad7113c687e9f9bb30b64e442c8cee13f7
SHA5121653c2b5a2be3ba330bcfc827ae3b4b8ce9a0f9baa227c9ada0ad1fbea970efe74c50f73a5ffa2baa2b5517d48d887352fc28542344fa4edec7ac4b8039e8a38
-
Filesize
1KB
MD5d5fb528f95b43ea34399b872b19e4a6c
SHA102bf6f582fb6d927326bde4a3255bd301f567abc
SHA2568cc283f0b0f266ca79cf3e5f5a3b613f4338c62c4a364e105d231997583dbe2d
SHA51266e420d03def57bd7e0f9701e20932780a9fd7194d3f9004a611a40341b2ec52580d8b8de326c8fd578d61cc0187f4e8ad336ce5c397531c3cb71069042d5ab2
-
Filesize
1KB
MD5b98affd50bec3f965abc14e1056c437c
SHA1aa3afab282f1b49001c945730a38dead3d4e87a1
SHA256bb2d4d33e5fcdd67fdbd52b1c2730d7fe9b58e0c71fbda873922b4a92d005b2d
SHA512558eb9d8c5409e43222ef1dba9cbc58f369b687b3212a3ea08f10dc96b5a723bd079de47a00a0726bc5c80b56b4dd9c3df941a8fca5ba10804ce9f247e07fadf
-
Filesize
300B
MD5aa18dcd992541dac48905f7d62ffc1b3
SHA14a2b945db35308116692e674f91717d703d40ea7
SHA2568756024bd5ee5e81fa3b5761362c6e56e773d126e6a7d6048962cecf2eef3377
SHA512cdc6bf6a6354f8d9d8cc299972aef01a9ae306b775e159593e9a51c14576a37cc8f7b78d4a644d24d6a2dd00488267e021b16e22da753cdf69ab19a16aeb284e