Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 08:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe
-
Size
169KB
-
MD5
63b6e99946066ff0a4524bf40077a25d
-
SHA1
72e13910d756720e952999803fef05d9a336cbb6
-
SHA256
19abfd29560432b083bdc06842c2f17304a50bd09f8e3e1bca7341aefd0492bb
-
SHA512
5fa231a1454016061caea55438fb0dc18444a6b518e2441eac7784da421c1c531724886cbacb29528adbbafd6e45a4bae1bd6bc1168b3fea9b987bb41c84570e
-
SSDEEP
3072:4EIFKOKD1rajcxrFZsvGg+wURIoCsmSIiDVI6AiTOpGKSIV3rTMwWVrK0nJXdf2k:2FTKD1O4RZsvFRfsnsiTOpGxg3XMwWVF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2020-13-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2372-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2372-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2364-117-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2372-119-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2372-273-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\619FC\\6773D.exe" JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2372-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2020-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2372-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2372-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2364-118-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2364-117-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2372-119-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2372-273-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2020 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 31 PID 2372 wrote to memory of 2020 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 31 PID 2372 wrote to memory of 2020 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 31 PID 2372 wrote to memory of 2020 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 31 PID 2372 wrote to memory of 2364 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 33 PID 2372 wrote to memory of 2364 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 33 PID 2372 wrote to memory of 2364 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 33 PID 2372 wrote to memory of 2364 2372 JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe startC:\Program Files (x86)\LP\3DD6\337.exe%C:\Program Files (x86)\LP\3DD62⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63b6e99946066ff0a4524bf40077a25d.exe startC:\Program Files (x86)\FC38C\lvvm.exe%C:\Program Files (x86)\FC38C2⤵
- System Location Discovery: System Language Discovery
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c2b65f1f46b571b3bf1a1cf16abf3b3d
SHA1a610a2b0de0963815e82459b5dbdffb26140bce4
SHA25696359b5f8ca15cc65c894a7f7583bd06cd7ad11580ef5012eb15a34c62fb196d
SHA512a75ded797773426dc2d667a345adc041ff2e5bf9ac5376dfce3459e08499624ba0878aef965ed23323462b04bb5b6f9054da098a73a32e40c854b5a45aa87a45
-
Filesize
600B
MD5c6d58b0a300fd4c3cf7a1b4e4e49b23a
SHA18a6274f6fcd0b1a57faaf22afd3030e28b467987
SHA2565eb3495f374caa5a2a70d360d2e0a2f2473db4981f0619441686fd3d89ef6bc8
SHA512f848bb6abe20ad82b064ef88fcc9dd0a97d83ce97b6ec3d27b2daede3aae8eb7603f1a39bba0e264a05fb547b0218cb9f9c012b2927c0f43b8400e2344fd383b
-
Filesize
1KB
MD5bd279fee86806d9e377102de92e56416
SHA17f052813a9c7a16b2c14a1a9e88ca8a4dd829ae1
SHA2562ec61be13dfc3b6e2f8beb3cadf08b2b21e049bc495722f704d45ec7a712f761
SHA512f2ae17ffdbedbb0a637f9d8287fad7e4a3c6a3a9d0542456626f9780aac3b70a4cf645f37e0944e2352319677e53325530d34b24e7a63cc57f519d833181601c