Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 10:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe
-
Size
164KB
-
MD5
0c0d20280c10e0d9974a125903dfceb3
-
SHA1
a92aba188f4d5500230d9789e17189d6b389d904
-
SHA256
257ecc779d14a601ec0815b0c033137c9cbe4a450385c0bbdc989549cb41a76b
-
SHA512
880e11c0a2b3d29638a2d5caef6cef631044a74ba86f46b62f56102fba9942c697c44eec8c5e2bfc11d8a81cd4f0563d6e103445322d908055454a3328b7ea66
-
SSDEEP
3072:uJFzJVA/H2HlLiPxewbim34iXRSG+sZZDb5f/0T133NV9K1FmH:K1JO/WQdbim3bScZt/g33NnK
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4648-17-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/4308-19-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/4308-20-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/4308-140-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/4308-310-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\96EAD\\58F2D.exe" JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe -
resource yara_rule behavioral2/memory/4308-4-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4648-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4648-17-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4308-19-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4308-20-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4308-140-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4308-310-0x0000000000400000-0x0000000000490000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3136 448 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4648 4308 JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe 84 PID 4308 wrote to memory of 4648 4308 JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe 84 PID 4308 wrote to memory of 4648 4308 JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe 84 PID 4308 wrote to memory of 448 4308 JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe 99 PID 4308 wrote to memory of 448 4308 JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe 99 PID 4308 wrote to memory of 448 4308 JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe startC:\Program Files (x86)\LP\2D99\7CD.exe%C:\Program Files (x86)\LP\2D992⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe startC:\Program Files (x86)\AD3A0\lvvm.exe%C:\Program Files (x86)\AD3A02⤵
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 4403⤵
- Program crash
PID:3136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 448 -ip 4481⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD58f814ab489497cd840d468eb8944ac43
SHA137c2751ccfb4f5a20fc7bfccbf2d06fa488e33e5
SHA2561ae2caf104d61c597d0f71e34d39271ce112ca8bb01f6ff0c0d0e527d09a48a0
SHA512da809bb55d15860cd8895fa41b4dd264df957d2182d8be902bb1e74e39c6b1c533fc242652b5e600bdf48226628fb1917d237c141c1b1b1e470c106a3a9703fb
-
Filesize
996B
MD5c1ac65539d2228493448f1fc6f3f85e2
SHA11c1fdc01ce14dd4ead9b218f79fdeca835638fe7
SHA25635e3aa5234100a668d770a7397dfa5f3da7ca70ee243351aba91f24c867bba2f
SHA5127161598a579f54803e381857f628bcaf5df25ee4e0ed30bd982333cd966573afe7aa13eda5dd810624d6de564c8e1b7fb79a6dcf834e5171c030cb0c846586b9
-
Filesize
1KB
MD57fd405badbf156d78a51e189db5694c1
SHA1bbb4598fc795a30a33471049eff83474934744fa
SHA256f4abaf1f1f7cc3125199e50632a8d06a59570cba247844fb2207e13a98f2765f
SHA5128cd2d09297b4c33d54bb50b67cd2add542e92bfba86c25cb81841da778b86fa28072cf62be9f6d1f0cd8c7522765cbf268406f519edf8da0cdc316ff1e896a6a