Analysis
-
max time kernel
3s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe
Resource
win7-20240903-en
Errors
General
-
Target
ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe
-
Size
377KB
-
MD5
ec38a92b581c0706e81871d93f5fa4c2
-
SHA1
92a58d195f4d1c22588bb532437faf654c93e18e
-
SHA256
33cbccc8c9a5c4502f1e004e8c13d0a79b83fcf6c37de84b9fbf71167022dfa8
-
SHA512
ba28ee1f9693373e120a4785ca00c737119f9405c590c01e3e0b0eb01e5586230c7d0e7d3837801341bac99a1ab6232fedbed5f21d2df3a4956cbe4490302c28
-
SSDEEP
6144:2bNj4uD+tJgVK5xr+tb9lYpKwC8tBHrOfVMpmuiNmDg3xVPmgXPBmEiMWg2c0IN:QRAJgRflYNC8tkfVMpWz3xsS2QN
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 1 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1552-55-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 1876 Keygen.exe 2308 2 Gansta.exe 4132 3IC.exe 4396 R2R.exe 1552 R2R.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Program Files (x86)\\Internet Explorer\\lvvm.exe" R2R.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 3IC.exe -
resource yara_rule behavioral2/files/0x000a000000023b72-7.dat upx behavioral2/memory/1876-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000a000000023b73-15.dat upx behavioral2/memory/2308-21-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1552-55-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\lvvm.exe R2R.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2 Gansta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3IC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4132 3IC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1876 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 83 PID 2012 wrote to memory of 1876 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 83 PID 2012 wrote to memory of 1876 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 83 PID 2012 wrote to memory of 2308 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 84 PID 2012 wrote to memory of 2308 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 84 PID 2012 wrote to memory of 2308 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 84 PID 2012 wrote to memory of 4132 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 85 PID 2012 wrote to memory of 4132 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 85 PID 2012 wrote to memory of 4132 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 85 PID 2012 wrote to memory of 4396 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 86 PID 2012 wrote to memory of 4396 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 86 PID 2012 wrote to memory of 4396 2012 ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe 86 PID 4396 wrote to memory of 1552 4396 R2R.exe 87 PID 4396 wrote to memory of 1552 4396 R2R.exe 87 PID 4396 wrote to memory of 1552 4396 R2R.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec38a92b581c0706e81871d93f5fa4c2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\Keygen.exe"C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\Keygen.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\2 Gansta.exe"C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\2 Gansta.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\3IC.exe"C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\3IC.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\R2R.exe"C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\R2R.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\R2R.exeC:\Users\Admin\AppData\Local\Temp\nsc7F44.tmp\R2R.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming3⤵
- Executes dropped EXE
PID:1552
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bee76c79e2e63e198038e01f0d571038
SHA1fcffdd6bb030f516a46e9d303ebae2ab33af222e
SHA25650a3c7134460bfe5f2840bd8dc957edfaa76da5beaaff70f8da5e0fef80ae876
SHA512dd2e9488ad365c02722e1a2466acffb8beaf4dbb68d7093e01c50cd915418ca0642cb6bdd43f2f2b014455803f3c69dec24ca9dfee11bdf7790379181cd2f6f9
-
Filesize
220KB
MD5f8988c24eb93773d7ce7b27b0c0ac727
SHA1c88f2424865a87f70b4e3c64aa7f34ed8fb2e9d1
SHA2566ea685865dfc1d676ea4353283de72d61dfb927d548954285b4cf8a0f0cb6f4b
SHA512b5055fc72b7f83f674ffd1ff84e0ee39a040491a9c578cc678ee30666a06b719a1869ba5e4e0330734e0f68063c865274d6b1a2b5cc4d65547d3f99e4b136fcd
-
Filesize
9KB
MD565d2f6f41b1c9d41f9468dbb7fe271e4
SHA157f5519a9cfaa3b3f57b5fed30ca55640c69e9d8
SHA256d0942480dc91cc82e6b95d69cafa0e6d541ca082f22a3cab69b1c0f6686a2fe6
SHA51221000b63ee2ed7fcf85b090c6c48dcb0a7c8e63e70ce47dcdee07cb8b59ce808c1e207dc544bb37888872e731fd36e312d7f06dccdcee7bf1577acc1c3e11b2f
-
Filesize
170KB
MD5db5499ebbfe3df8ef3f407422fab6f68
SHA19fc65b5092099782b80280e6cdaf109a89a16cfe
SHA256f7644bab8ce7f0927f045c6c0ff84cbe45eb471d071c0eada673e9af06e8d7a0
SHA512e132462dd5ac0eb36feb2bd92c004056dc164cd96546455d5202da7621436e06a811d94d8c440e71d429acce7dd8d18bcdf6c92aedc251745bda9342af7aa260