Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 02:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe
-
Size
179KB
-
MD5
7735855acf95a20be81302c8867ed6ca
-
SHA1
e1aed269a95936936914238fe2f923c0e0894d02
-
SHA256
9e9cc54cc7db0037d641d1496ea2021b248ad829b7c19484886eba8c3d15d6f2
-
SHA512
0660a122ebab89bfd1d975a74e34b7456e0397c8306dfefe74069bd1c3ca1c8c613a842adf131464c14f216d46eb0df3bb71c5b491e65e94d1dff74d9e69c8ea
-
SSDEEP
3072:6uTbE585+kWQKhRPZeBx+IG1jaFjPy7D6lC2YGvrFB5nXIADu:6Sc8wRzhaxK7D6LrFBNh
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2832-8-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/2716-15-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/2588-77-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/2716-78-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/2716-169-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/2716-206-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2716-2-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2832-6-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2832-5-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2832-8-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2716-15-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2588-77-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2716-78-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2716-169-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2716-206-0x0000000000400000-0x0000000000485000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2832 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 30 PID 2716 wrote to memory of 2832 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 30 PID 2716 wrote to memory of 2832 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 30 PID 2716 wrote to memory of 2832 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 30 PID 2716 wrote to memory of 2588 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 32 PID 2716 wrote to memory of 2588 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 32 PID 2716 wrote to memory of 2588 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 32 PID 2716 wrote to memory of 2588 2716 JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7735855acf95a20be81302c8867ed6ca.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54378fba1b966f88ab87d32373ed39cd9
SHA105c20f61104a667f6c9ff528b2a5d74c7a306d97
SHA2568ffc3a1a5955def26b9105cf851450bfe5b82a984ff80140bf6225fade0521b7
SHA51265a7e5f639028a3fab764cbbfe9389253d7183651626658aabc01e3cc06a8ba051420e951fed97429f116032099e649d2da8243baae69d59addee0da8479f0b8
-
Filesize
600B
MD52527a17ef0a5461d7397ad2948d5a45c
SHA17a6f3943f63b262e082c69e1adef3699a2b737e0
SHA256f75f8899484f9162e00fde5d167f75d0ec54a17b8d06c1ec82405e7c9ab4e9b8
SHA512de830e9a9a1a7f1a07d9bd2f796b0ee744eb428f7adb4e30946e5cfbda01a1511fbb5bbebc973f8608bed7a3daca40fbcda5190a0d6ac6c7c52242ad08f81e30
-
Filesize
996B
MD503dce4d9556d497f5ce37806f759678c
SHA15635714b9fea1d3e7b2cb298ac061eb3c67543c0
SHA256c2ce713940b6e324fc9391e09a8835a563fca554942926b182c07e3c1b25dc87
SHA512c8051c9c7457e4dcc5c668c62e82b835ab9a168c59b658c1dc545fce6c58dc1b3068d2385b10170fcf2e20511fa9debff2414a710c1dd7f9566dd14ccd1169fa