Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 19:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe
-
Size
175KB
-
MD5
7b52ffae7f920b2562d5dd51c52bdcc1
-
SHA1
3ba49d344daf610ebbe908793316fae3c3b3a215
-
SHA256
3cba8c269d792d81024d5f7f5102d6de548839d01e4f7bf5b346b32773cf317e
-
SHA512
70805e6b8d564fe3eb96d666532b22e0711b2cfc911de255d13b42ca8dff729464d97059592e8ebc1c150120de0d8876aeee12717b862faed544a0b1047406a4
-
SSDEEP
3072:Oe1gpuU2nZCuoW/ZIZMiQLZN6BCalsJGLTeKMcUTW:OeBJZCu1/KZMvLXCfsiTkcUTW
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2732-14-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2936-15-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2112-79-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2936-150-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2936-184-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2936-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2732-13-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2732-14-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2936-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2112-78-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2112-79-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2936-150-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2936-184-0x0000000000400000-0x000000000046C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2732 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 30 PID 2936 wrote to memory of 2732 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 30 PID 2936 wrote to memory of 2732 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 30 PID 2936 wrote to memory of 2732 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 30 PID 2936 wrote to memory of 2112 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 32 PID 2936 wrote to memory of 2112 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 32 PID 2936 wrote to memory of 2112 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 32 PID 2936 wrote to memory of 2112 2936 JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b52ffae7f920b2562d5dd51c52bdcc1.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51cd8a7d8eb3e07703a67e40e101d9eb8
SHA1601f089a12c31cbc5ddf7f2a76c7fa3dea5f25da
SHA2569530250b567d43af67050aac18018b2d8127f3433da52938e7908c3bcee49889
SHA5128edf29101db7491aaae9d19724563de87bf75b3f6df6b89c7a348a04be4bdea98ddb55f6d89708ea43418592a1d7548bc77ba7bc810d5fff384244e598f3365f
-
Filesize
600B
MD55506d679336cc991d352972e98d4633c
SHA17134cfc8dc3ccff33348c40e955d4007825203f4
SHA256bb48e19c26d56acda8926428b8462ed0ebce42a303e2a5ac5f8874111deaf67c
SHA512eb1a92dccf98201f0d1a4e9f1a69debc10d3d9b01309ab99eb0a8e57cd416e6d84a23196b16d5e48317dfc7e16259d879370f907c08d3dfed0f05645d7486b95
-
Filesize
996B
MD5cdcf71d156afdfe97c794be4f7ebd9d7
SHA1a13ad69c9b3eb866fae7547652dcca7e09c0a36f
SHA25695924177f23a966f01decfd010da0e56aca6a88480763a62c1e7811d8dc4f5c6
SHA5122683f7baf58e1d678d4450703e5dc9bccd6a44ed68ceae8cf8ba93efb9e08387f9c5b0fdbd038fac7413dbd1aa91480d9e49ce3b0a118e06a4b3fb23b60a19de