Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 13:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe
-
Size
166KB
-
MD5
0f8ff1d02f4d2ab438537afb36cf0bfd
-
SHA1
468fc26a61057e42e34fd9d7ca567d81b4fe7b07
-
SHA256
27dbd55f0a916a37c858ebcad87c4fd4b56d30768c6b8fad1b7bd52d3da9321d
-
SHA512
c9460d922a16272e8c902a2f9b240e811a12903265a9d907b5ee29fc5c7dd67d705ac22115de815626619f5a1511692f40a3a456ec4f9ebddd37893e6ff82c69
-
SSDEEP
3072:H45D2T8WZ9Et60okcy94lywywBs6zukCSQlx93WH9wQ/QRgpcNGSH2RCxzo:H48pEt60o1yMyT+sRhT93fQ/Y6cNGSWK
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4856-15-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/412-16-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/412-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/3324-120-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/412-121-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/412-287-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\A654A\\932DF.exe" JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe -
resource yara_rule behavioral2/memory/412-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4856-13-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4856-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/412-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/412-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3324-118-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3324-120-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/412-121-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/412-287-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 412 wrote to memory of 4856 412 JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe 84 PID 412 wrote to memory of 4856 412 JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe 84 PID 412 wrote to memory of 4856 412 JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe 84 PID 412 wrote to memory of 3324 412 JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe 99 PID 412 wrote to memory of 3324 412 JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe 99 PID 412 wrote to memory of 3324 412 JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe startC:\Program Files (x86)\LP\DF6A\5CE.exe%C:\Program Files (x86)\LP\DF6A2⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe startC:\Program Files (x86)\4A1C8\lvvm.exe%C:\Program Files (x86)\4A1C82⤵PID:3324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD558db29c79e2fe9054fb73838512231c7
SHA19cae32ac76d48573ac47a4092af773eeab2c0434
SHA256d44e2a19f837ade8e9f915f4d0783510cd1b57c3969cf498df79a70075af3837
SHA512969589eebe4a58e3ed1c00e15f19485db4c88663ded20e831dda06cc1dadb631f4d3da7ebae0e500dcebd8e030474a2e5759e0263540742be5034609df9c080a
-
Filesize
600B
MD5810c99edcc5ab9b69f8d71bc935dec8f
SHA15a4414274d34ff225f011cd77a3b715ba002aadb
SHA256ffae6c9ae7022474c8d34a12ec0de1a382ebf0ee6508bee34c15080c64d49eba
SHA5124c0ba89df2763e47bf5bf0366eb644fb37618a0291eea1a6b50a9759d07cb079688bef35a19ea6b718d99b2e5043c9b1cb5bcc4797e5b51ac398b65d4e0a1a41
-
Filesize
1KB
MD5283064e34188640afd12269912a94013
SHA19aeceb5cb5bf7ae36de042a301ed0dffe970d305
SHA2566cd5c622e1245f7d489a3d0e1b92bf3411c5907b217c1bda29a18406184680f6
SHA51211361f908a587ad2f2c01bbd7a3ca4457ac09d2bd8159bbccc6f7e52ad8a725da25ce025a6b8b6ef8538930f5ed5b447148efe243cea0d1dba8efac3e8d566b6