Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 10:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe
-
Size
164KB
-
MD5
0bf4554992ee0878a8abb67e4677d80c
-
SHA1
46aefaf1ab4bf380606fb91d52760a3999186c43
-
SHA256
1e424f2536d03c57ab46b2c3ef5dd0ba885546d8dcafda676b9a73174a9f2763
-
SHA512
0b2bcd4a61953679f30b19c4e0950c10f85bce93273feadd94e842cb961feb1d7c73ce99644d28109781c7c63e5849de56af89c3f0e9665a0305c3afd1ad795d
-
SSDEEP
3072:8E6pnXFXE7Nc1ekFPK3GPNltV8AlsaWQPE0taSk5KipEk7YE+ou9BrO:8fn1XEZFsPzXtaAls/qbtQcipEqYdfO
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2476-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2736-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2736-18-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1696-138-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2736-139-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2736-313-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\99797\\1B45C.exe" JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2736-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2476-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2476-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2736-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2736-18-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1696-137-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1696-138-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2736-139-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2736-313-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2476 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 30 PID 2736 wrote to memory of 2476 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 30 PID 2736 wrote to memory of 2476 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 30 PID 2736 wrote to memory of 2476 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 30 PID 2736 wrote to memory of 1696 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 32 PID 2736 wrote to memory of 1696 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 32 PID 2736 wrote to memory of 1696 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 32 PID 2736 wrote to memory of 1696 2736 JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe startC:\Program Files (x86)\LP\5CA9\4D3.exe%C:\Program Files (x86)\LP\5CA92⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf4554992ee0878a8abb67e4677d80c.exe startC:\Program Files (x86)\9747B\lvvm.exe%C:\Program Files (x86)\9747B2⤵
- System Location Discovery: System Language Discovery
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD52ef7288cacaf031b15a89592af280be0
SHA136b7702ac281392ec3811b196ea5365193cd0863
SHA256cbc10d4ea6ac80770ec6bc78bc5fe5970bf937a8e6c95137e07552ba1b2c501e
SHA512e18a42bf276e262cd5667c58cb0e793fdfdece2da102770553c463b38898cb0c12ee5f0d5aa8f49bd27d895758021fe488634ff9376483357458e46cfc3deaac
-
Filesize
996B
MD52aedb8be1aa6e7a3cc79e9940159f9a5
SHA13c0b9caadc44ec901f9b7d1a3dad522df1083df8
SHA256b8d9dcbcf1987448b320114c6b0febc57d171bccbc2d1ce37f8d2d5ba5e9fd71
SHA5120aae7f24e1ccd60540e9611f9312db9bd5ec30962e993d10b4eae3bfbf84797e89c465368bfba44d533947b816e2472513a14076d8ba19e0e7f99dd280f83945
-
Filesize
1KB
MD5436e2be3beeabc5473ffa2d5c381a4e2
SHA16cca182419586202cc09cc45a3ae119dffc8c36c
SHA2566cdac1aaab79262e90c68f615957f5a8149e24ec0075dcfeb6d87c3d88ac7e4e
SHA512782eabd83cde6325732ae8395e555bb6a391ae7d43545d657f6ddedbb72aa5113c7d21ad569d25f7509f95e9354ed22eb0a57eebd4b1273b9451ca353a9bf423