Analysis
-
max time kernel
140s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 23:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe
-
Size
178KB
-
MD5
1a9b7f68c4b4232ac15708b289ae8135
-
SHA1
9a8f1da1a4d4a69153cf1a4120802b66e038dd2c
-
SHA256
4e1f2b6a504b421ec6cb4c98a105248643dff527aee26b39e3cb8279eb8a6df3
-
SHA512
9eb990715f049a8bd759e63e99dfec2eadf735ca6a344608cf06017444b44f75859ae68b1152405822507c7118db646bf052f8b235202ec2af6aacc5867a7e74
-
SSDEEP
3072:HF8h3rEGnHZfg15j6o7ouFD5txqo5rjuv+Q3ZWTZHv7nhR1cJCd8ahjau9M17mjw:HF8rVH1C52o7lFAo5OGQ0TZusd82/9M7
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2852-7-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1996-15-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1628-79-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1996-80-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1996-179-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1996-2-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2852-5-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2852-7-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1996-15-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-79-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-78-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1996-80-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1996-179-0x0000000000400000-0x000000000046E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2852 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 29 PID 1996 wrote to memory of 2852 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 29 PID 1996 wrote to memory of 2852 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 29 PID 1996 wrote to memory of 2852 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 29 PID 1996 wrote to memory of 1628 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 31 PID 1996 wrote to memory of 1628 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 31 PID 1996 wrote to memory of 1628 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 31 PID 1996 wrote to memory of 1628 1996 JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a9b7f68c4b4232ac15708b289ae8135.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53c4b314cd566c450e867c6aba61b012c
SHA1523ed85e96d3880e83367f4c93ac7ce26aa9b241
SHA2563df1958bcd08200637da8afb75d7030099f373a98f4528448d4d29670ec0946c
SHA512c1de814aace97164a1df85ebbc91bf2d656726a5a1e227b95dca116f0c6280db677e5395264f56502ae0c4bea67bb6ec7add3f888e082d527fc4cf0c85c66d88
-
Filesize
600B
MD5f94bbe41a0341b0a96bf3e8ac86c7873
SHA1050432819405132ff7b4c1c342ac1521d8d25db2
SHA256dcca9590ca2e00d09cb1a48b0cb1d545d8a52be5059c774ff2c1786fa916d84b
SHA512e20aca338ad817ef6fe7916de9c6618023a7091edfd7530735612136071185b43c6d5520ea1e9d010b163c46469ab234288b2a563e88c12befdb274eda250991
-
Filesize
996B
MD5c4775ed757b02b5ca82e87edd04417d5
SHA1bcae178bb9adbc4ec48591209ca6ebc0e08ffe5e
SHA2566fe1c120460431ab513ef52b06a6b3ceea50d6add3b6f801e8427c537c18db45
SHA512ed7a9948ae8dacdb086df6b91479c2814c9ed28e843f2a77d5599e345a47aae2097e802904ae0a450d394c4707c23d263d1be8386913003b33bceaf4ce14faf8