Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 13:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe
-
Size
173KB
-
MD5
570c4f83de6b15683d8bcc40565a7e9a
-
SHA1
e4bc20440392cf90dd51d6e949baf753e886ab08
-
SHA256
7286f56b607b60fbaf5ad8d1e6809425646c639e417e91fa3fc1930cfe12efd8
-
SHA512
89d3e1535d0606cb1f76499d3c38a90c33485c5db676e2c23b8a13ee160b2da3e23baed01dc205b17cf811e8404f83aced9f3d48b3dcf4869c665062d27d39b2
-
SSDEEP
3072:OuTCZs9t9TIcRILdMRdMlS/zVSigDJ34j9EmEu3J1o2Xcf6:OsCa9PIcRsMRdOS7QiU4JBJFN
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2700-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2700-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2280-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2280-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2700-81-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2212-84-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2280-85-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2280-187-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\97E42\\AFE07.exe" JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2280-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2700-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2700-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2280-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2280-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2700-81-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2212-83-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2212-84-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2280-85-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2280-187-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2700 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 30 PID 2280 wrote to memory of 2700 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 30 PID 2280 wrote to memory of 2700 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 30 PID 2280 wrote to memory of 2700 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 30 PID 2280 wrote to memory of 2212 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 32 PID 2280 wrote to memory of 2212 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 32 PID 2280 wrote to memory of 2212 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 32 PID 2280 wrote to memory of 2212 2280 JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe startC:\Program Files (x86)\LP\0739\01B.exe%C:\Program Files (x86)\LP\07392⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_570c4f83de6b15683d8bcc40565a7e9a.exe startC:\Program Files (x86)\4208F\lvvm.exe%C:\Program Files (x86)\4208F2⤵
- System Location Discovery: System Language Discovery
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD584029f3f55c253dfdf43f99fa190e8c3
SHA1dd8229a10747415bab7788e4392febaaa2b533f5
SHA256bd2fe7df935523b8ba105bb483fbc8313ee02c2b85235db2fd9fd9fab8b9b9fc
SHA512cb5b8f5bcbff7939d19445d3b6997d19f12a758d590ba1e65985dff9913172f704f42c289d70fd8f8f8fd8559a0a4c71b9c224fe27fad22e06a7178262a2b632
-
Filesize
600B
MD5643e851019eb0e826bbab0a1519ee2ca
SHA1ce7796b491f35f3395d7f511e802757eb955b759
SHA256fa686a7621ddb10dfc4a6030f08e0e967750d4f284fc2af79560c2848ff4c045
SHA512038fc64a7ce3e8299b33b435fa3916562d7e57a27eb9eae6ec5d152d722d7d90325061b1e0c8e25f169bbdaf48f07fc3585de7383d3486cb2d4e646bf81c5d7e
-
Filesize
996B
MD58aa328f60bf1ff55b250d90e1f38755f
SHA1d8fb983bc7877fde4f0e3e6a4a847ae35ad5ac12
SHA2564d3a49d5dfbaedd007c9f404495f31cd2cac4130b409cb09dab0a4d8bd8bb0c0
SHA5124e3c54efab5c55547ec2ca8011ec1cda142191f9d3409ba3e7e089c0d474e3ef639d42fc8766e6c229c13f0ae5efa5108beb79c18a2de786627f6f686bd06be4