Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe
-
Size
176KB
-
MD5
e3f540d2c1bec03f3dacc75d0057b942
-
SHA1
ce65f2ba83a7d9d997566c60ff0f43fe8565d348
-
SHA256
319edcd705e76c1ae09e9ef383a964a042c71d6cd859f6181ab7b16d678e4afe
-
SHA512
b7c81f66d52be1a28049d8f7220453611cee326f6ccbf458b37aa0f1ca4f7b36fc4303d381aeb62ddb0623f0b45f6b779a4dc6b7380f843d1cb98a086d190baa
-
SSDEEP
3072:/CsNAKJx/U5Z5X81JAhMcQM3+2Kl9Vd/PwmJ35I7EFEes5iPMARCksh2c6JNB5oS:/DAQG5GJgMcvgl/Pwc36OpXR+hF6z7bX
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1132-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/4592-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/4592-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/4692-124-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/4592-125-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/4592-295-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\9044E\\9E42C.exe" e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4592-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1132-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1132-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4592-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4592-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4692-122-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4692-124-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4592-125-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4592-295-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4592 wrote to memory of 1132 4592 e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe 86 PID 4592 wrote to memory of 1132 4592 e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe 86 PID 4592 wrote to memory of 1132 4592 e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe 86 PID 4592 wrote to memory of 4692 4592 e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe 91 PID 4592 wrote to memory of 4692 4592 e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe 91 PID 4592 wrote to memory of 4692 4592 e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe startC:\Program Files (x86)\LP\2CC9\F46.exe%C:\Program Files (x86)\LP\2CC92⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e3f540d2c1bec03f3dacc75d0057b942_JaffaCakes118.exe startC:\Program Files (x86)\4ED42\lvvm.exe%C:\Program Files (x86)\4ED422⤵
- System Location Discovery: System Language Discovery
PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c6b91ea31f1a3f1be71b859e798496fa
SHA1dc47d00a74c42df3fd3a9d46dc031840a18c2868
SHA256451b0fa5aadf05fd9036135ea87246de78854e77beab612493c176b68f1a5953
SHA5124fcef55def2e8d5b9aa36e691f29d62c636ca4acb6e3528863b3db86af59fb88362aeb037e6ad63f0bc49629620d2ee9829f52e008c9b2cde458493d9eef6775
-
Filesize
600B
MD5bab44cc8957741bf730563becfd87255
SHA13912e214e832a9e836091da409ccc8e50eed0056
SHA25682acaa59832580d8cf0ac8f14a1580c1cc1ed39178c3cc1e73dcd87c4c3ae1dd
SHA512d8db7e89001d24cfc45c593f4a875ac2cefb45368dedfba19deb75f26f6c084e0a411436e6da48d36adcc8bfa63b42799c549c925d85dcc13fb97697f972fb50
-
Filesize
1KB
MD5bad2334421b5ba0d7184a1e0cb040fed
SHA12783022686f279a26f2bc73254ca3085cf9ce4a7
SHA256e81213add1974385e55757ef34d527f52aa43b00cc18cc0b4617967d98a7d77b
SHA51278fac306890fced1dd96e8a389953f070535829b9fd821927102fb82f614a4d1bf14b2c6267ea59daaa5a4cbe8c97fe30e753be5038cebb723726f1c9ef845c7