Analysis
-
max time kernel
3s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 11:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe
-
Size
520KB
-
MD5
5422b11c5c918cb79d2e9b7525097352
-
SHA1
ed52c3b9238afa61c6f4ec5d66c6ac51e5ec8db5
-
SHA256
8c88cc06cc2f5dd0d2998de7c13795d2c341cba5040312432f009d8a0eb6da14
-
SHA512
b8dbbbb493fa2093680db0492dedd2ac7d02f24f161ae778e3533b72c4ba71d7efb873965966790b6e81e01567e778873c6394392066aa8dc14d1d853d6c95bf
-
SSDEEP
12288:DcUoJs1qoWOFZCjOdvUgyLr/Jh4QWfP8S:q21q4C6z+r/IQsP8S
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 1 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/2352-129-0x0000000000400000-0x000000000044B000-memory.dmp family_cycbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe -
Executes dropped EXE 7 IoCs
pid Process 2596 ic7.exe 4468 3IC.exe 348 2 Gansta.exe 2604 5tbp.exe 4948 R2R.exe 1488 2 Gansta.exe 2352 R2R.exe -
Loads dropped DLL 1 IoCs
pid Process 676 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xsocomukimup = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\mshTIn.dll\",Startup" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" R2R.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 3IC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 348 set thread context of 1488 348 2 Gansta.exe 89 -
resource yara_rule behavioral2/memory/1488-72-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1488-68-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1488-74-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1488-73-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/2352-129-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2 Gansta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ic7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3IC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2 Gansta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4468 3IC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2604 5tbp.exe 676 rundll32.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4828 wrote to memory of 2596 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 83 PID 4828 wrote to memory of 2596 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 83 PID 4828 wrote to memory of 2596 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 83 PID 4828 wrote to memory of 4468 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 84 PID 4828 wrote to memory of 4468 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 84 PID 4828 wrote to memory of 4468 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 84 PID 4828 wrote to memory of 348 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 85 PID 4828 wrote to memory of 348 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 85 PID 4828 wrote to memory of 348 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 85 PID 4828 wrote to memory of 2604 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 86 PID 4828 wrote to memory of 2604 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 86 PID 4828 wrote to memory of 2604 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 86 PID 4828 wrote to memory of 4948 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 87 PID 4828 wrote to memory of 4948 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 87 PID 4828 wrote to memory of 4948 4828 JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe 87 PID 2604 wrote to memory of 676 2604 5tbp.exe 88 PID 2604 wrote to memory of 676 2604 5tbp.exe 88 PID 2604 wrote to memory of 676 2604 5tbp.exe 88 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 348 wrote to memory of 1488 348 2 Gansta.exe 89 PID 4948 wrote to memory of 2352 4948 R2R.exe 90 PID 4948 wrote to memory of 2352 4948 R2R.exe 90 PID 4948 wrote to memory of 2352 4948 R2R.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5422b11c5c918cb79d2e9b7525097352.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\ic7.exe"C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\ic7.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\3IC.exe"C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\3IC.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\2 Gansta.exe"C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\2 Gansta.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\2 Gansta.exe"C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\2 Gansta.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\2GANST~1.EXE > nul4⤵PID:4144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\5tbp.exe"C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\5tbp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\mshTIn.dll",Startup3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:676
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\R2R.exe"C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\R2R.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\R2R.exeC:\Users\Admin\AppData\Local\Temp\nsl9675.tmp\R2R.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming3⤵
- Executes dropped EXE
PID:2352
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD540a8954e5d5796aef2e6e00d96c12ee0
SHA1f703035eec111ffb31ea347f3010c35652bec612
SHA256f21fdfba45f7f88a0f76a2f58ccf951788b175e6947744d62046fe17152ba160
SHA512888a6db559dc74ca01f82c93508779592943393607047935bb95fdca86cba27cabc5dafeeec57a391404a4d0dd64b88f09a0dccfe38eaefe5d0f84612eff2445
-
Filesize
224KB
MD5bb2f6d3c0d76c09b6a543090615dcbdf
SHA1a05dceb2ab6c2fe47f0506b025542f6f8ea1b39c
SHA256fa0ae5238a1e5193a696af175adf145989ff09723dfff26f20173a788ebd8223
SHA51249f9149d056dbf2b5a3a5af65ea85c3b7d1767e9a7433cd91ec633c135e5f15a89c65c913962fa0b731ffee9bd68fcac19c4e80d48710938420edd8811e79e5f
-
Filesize
108KB
MD503b927c7c418bb244c2080e40bc7c20e
SHA1f8abf451378cbc13ec4c336456d0ba096ed64459
SHA256317d95ad3f8b58b6e7d7623e4ead965aea9eff10934280ca3cfa104f3d176f48
SHA512329102dee848ed482c07e3d7cd528088a7526179382d72cf9c5a8325519fe40a5adbb1f8bb560ccd4a8e876f4ca3f0e893f8983195ad775249844dcdf4e39747
-
Filesize
176KB
MD5fe4a2c026c4e35fa381bca4729529eb4
SHA12a01a96f96fab921d8ee819219d69b034e3461b0
SHA256228a37f572738e60895ccaf9e2399065341bdb19ecab2e25422981de1098d453
SHA512dabad527ef72213b47a88128c4def4c5871775df45036647807918a3fba3a0af23d274d62bcf2667b66ec5e3e70a62e711989f2c2ae3ceaf398e0a09efd383db
-
Filesize
3KB
MD546e07fd3a40760fda18cf6b4fc691742
SHA153ee1a754bf5e94fa88a6ab8bb6120b4011afcfa
SHA256bd7ca609d2fb63e14d08acab1091579c23e298b4fa2ac1e8d2daaff94fc107be
SHA512ce13f6527cbd13002dca00b71ab38ab12e3f3f7138ada0780ad3f40e7c49946c018a00782ec957b1fd123fb439aabc0d9b3660829dabf10ddcebba08d6e2fbbd
-
Filesize
108KB
MD57d7679b1493c32da08daae1949e9724c
SHA132da402420f912e637f2a54c73d54d31c73d4912
SHA2565f73756e6fafd121ddff05750d8c21a4d9a29d319b8022591787451af7766aa5
SHA5126a57805aa0d0df5020b0290d4b0121621a278dc97f31c93dfd64420a597d90212037e7559fe5550d2f68e850714fbfc326a887ec48651e3617725edf5258d15d
-
Filesize
600B
MD5f54cce1bc90a58ea30767c7c8b96848b
SHA12b9774786f5310de149383f4b470f1ed67cc8707
SHA25618eec081e25ccd4e3d3142d38cb0ea1aa4362094e7ad2e93fefd6e00d5d59b5a
SHA512f67f7f3731e7509cdee44cf8a0258dc0c089778eca64eed30697547054c56cba1284dfccc77084c6c857fa4eca74f1e8fdee43eaa88fc2d2bf6e6f64a4f95ef4