Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 21:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe
-
Size
178KB
-
MD5
685a16e5561b8a0e821c19869fbda726
-
SHA1
31d91ac30b93bbbd272d7f437f07e9e127b78ef8
-
SHA256
aa6a148220ba43ed6c86f81eabd09c864d47f0392e12c0440f3205caef80a3d5
-
SHA512
c15542aa4a63ae3c5e906ef312f9ed873cc0acb0b5ebb3e30c9045e752b0de0adeb51c2fb9e466dbb88ec7565bfda69ce4d1d13f1ce54dab4632f4415e4dd715
-
SSDEEP
3072:EQBVyS6IvAFI+KEpHxbupiw/CPNfPA01GNaP0GXLrsv5c5IY81fpPXkxLF2ukO5I:EWywv81dupieEA01C2Xsve5IY81fpPq9
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2768-16-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2032-21-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1044-97-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1044-95-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2768-94-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2032-92-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1044-98-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2032-213-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2032-2-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2768-16-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2768-14-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2768-13-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2032-21-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1044-97-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1044-95-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2768-94-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2032-92-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1044-98-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2032-213-0x0000000000400000-0x000000000046E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2768 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 30 PID 2032 wrote to memory of 2768 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 30 PID 2032 wrote to memory of 2768 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 30 PID 2032 wrote to memory of 2768 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 30 PID 2032 wrote to memory of 1044 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 33 PID 2032 wrote to memory of 1044 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 33 PID 2032 wrote to memory of 1044 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 33 PID 2032 wrote to memory of 1044 2032 JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_685a16e5561b8a0e821c19869fbda726.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5eff6fb39cc2933f1a93d2205513cd041
SHA1f72ccb589ffd964f2ce574a1ee02493c0df4ac2a
SHA256bf9e470e8885b5af348a276e5d09783ea6dd636aab326b97cded04e0ba945f25
SHA512c39103faf76aed245b3cfd17f7640ab3fa8c55849d730e8f0f6415485aab6adf53b0b40f5c975fcb3b66e25cef6e276bdb44dc394252b9910534bfcf4afc095b
-
Filesize
1KB
MD502fb810d2a08155044a956ef6fd14fe8
SHA173ac4b224f92f6884ed310042da8988bd7793fc6
SHA25620bb72ac8beb39657ea7de209de9ef7b6bc83d6c88b5cb606d39573f6e01b43f
SHA5127447972cb4789aabc5be4ccbece509e9484970fc8d6e46c10cf2c0a2c4ce4be0a241bd05a30ac9fb56aa36e0e7a1a6ec82988cee0d4f1a878b62cf76a9374d39
-
Filesize
1KB
MD54095a55d56cb76c511a5c51650aba8d4
SHA169c17fb60c1f173e0545d5ff2e434212cd26182c
SHA256051dc615b5854a5f7b3230c461d6ea3bd641119d7ab31634ab58836f88093c12
SHA512fe71aa27fb0f4991657de2c5d529a2ecec8c5a70a9091a86b28131618809930dbc79598c0a470289c71aaae8937f967074ebf4c20a89fed62234b48368e5b619
-
Filesize
897B
MD51e2cbc210ff56d121d72807d83ca7b85
SHA13837b40ab3b9e11e296b7d0c7d66a8126352ebbc
SHA256e01a78a27d7efe3f51d42cc86340693309fcb7bbf47a44607d882f4ae16883fb
SHA51201dc40a5308d85b52bfb6d0673e221b214d4c995d3db03b078916edbea046c4026716c280c3e8c008644cecc4deabb3df5e8c91a7035c16bdfe71722a1259906