Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 11:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe
-
Size
164KB
-
MD5
0d4efbd79a37623d6369dee3c5b064a3
-
SHA1
2407501e662580dfe1060e66598439e33835a089
-
SHA256
213dd5b67ceac216ab5b5f66ef9b3e57880139dd8d3f84aaac942e27cde21799
-
SHA512
c8b94bc4cdcba5249f4b4f2f4ee2a051d9d394d840a1a94e820319bd7bd1187f1ca1f4d537ee204b4348d5102747c6f59fafc8301648b63f0697f041b8e81bf0
-
SSDEEP
3072:LTXmsHhK9s7K5KlAPm/6toqdamFpQHF/Ji6phss0jBNX4hkSDe+617PZKDF8h:OsHcq72KWWQamFMriy0jBAe7PZyF8
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2764-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2764-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2852-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2852-18-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2228-125-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2852-126-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2852-292-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\25E67\\E0FBF.exe" JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2852-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2764-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2764-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2852-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2852-18-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2228-124-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2228-125-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2852-126-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2852-292-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2764 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 30 PID 2852 wrote to memory of 2764 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 30 PID 2852 wrote to memory of 2764 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 30 PID 2852 wrote to memory of 2764 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 30 PID 2852 wrote to memory of 2228 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 32 PID 2852 wrote to memory of 2228 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 32 PID 2852 wrote to memory of 2228 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 32 PID 2852 wrote to memory of 2228 2852 JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe startC:\Program Files (x86)\LP\BF82\6A3.exe%C:\Program Files (x86)\LP\BF822⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe startC:\Program Files (x86)\674BC\lvvm.exe%C:\Program Files (x86)\674BC2⤵
- System Location Discovery: System Language Discovery
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5af317267cbac2b9e9e09ac93d9c24e61
SHA1e8f237ff8876fa5901e5e9841320768482660972
SHA2568f13915198dbd319bf085c38a675540f3c599bc55c07a03fb9b24076b40b4c7f
SHA512c0a348023f93a2db9ad83ecbed02935b43ba29ad139943f168b4384764df53246734ca63d997b438632f04bd02b0a761bab0690f3dad7142c522f700b7650816
-
Filesize
600B
MD56fcd1d8cd852173f0be81edc21d9eaab
SHA1d5ee19d7631383660508d72e6fe8544c9dfba31f
SHA2560c7f139fa6f93dc525c46b4f3f5b665e8602284990e441d935de8d4be62b8801
SHA512caf5df133665bcb259d718f99bfddfc28137d4118fcdb00e4b8de0264d195da602ff4e2d3cc4c2146a97e4292562d00865c0205d607a0a6328898020911d7db3
-
Filesize
1KB
MD50b5e63e8151c2c001b3eb1ec6c7b7c82
SHA1384040316ffb77700b1d2d32bbc538bd039fa291
SHA2565a5604fc50c603a4d9be449d967ec527337f7f5706ea95d81c16be7315a1e1bb
SHA512387960f7b0a15330c8604b2ff1cc9220d78d5478c99b1123b26d91aa084f0657fc3d2dad1671397a19d60a01216652531561863797746daa1ff67c8a0b0aeb2e