General
-
Target
JaffaCakes118_79924ed49d9002f4c03258f2082217b2
-
Size
840KB
-
Sample
250104-n59khsykcs
-
MD5
79924ed49d9002f4c03258f2082217b2
-
SHA1
1a1b0cdab5e7a4590ea7c1bb09787cf0e7df0a1a
-
SHA256
b251a293f115ea7131c40e839d3b38d64f6499fd5f1c9c64bbc9c0a068167de1
-
SHA512
1e8796bf633fb62390cd937892d89721287ac493116f3569d60dc0b0da4b24c5aceadfe40672a5f0f2518b4bd349bc8862b6e7821c3260ce7278c5ee864a9039
-
SSDEEP
12288:dCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:Ik9P7nCvX6MNYLIbgYJ3chra+GbrL
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79924ed49d9002f4c03258f2082217b2.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_79924ed49d9002f4c03258f2082217b2
-
Size
840KB
-
MD5
79924ed49d9002f4c03258f2082217b2
-
SHA1
1a1b0cdab5e7a4590ea7c1bb09787cf0e7df0a1a
-
SHA256
b251a293f115ea7131c40e839d3b38d64f6499fd5f1c9c64bbc9c0a068167de1
-
SHA512
1e8796bf633fb62390cd937892d89721287ac493116f3569d60dc0b0da4b24c5aceadfe40672a5f0f2518b4bd349bc8862b6e7821c3260ce7278c5ee864a9039
-
SSDEEP
12288:dCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:Ik9P7nCvX6MNYLIbgYJ3chra+GbrL
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1