Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 15:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe
-
Size
176KB
-
MD5
128bb43a3670a9e839bd989ffe857c83
-
SHA1
00389237875cc2f44b8391eb717e0c99be53e557
-
SHA256
4c4a2cb454f5cfd8e6b85ab37b99b6ab045780edfe1d37a7331b896c4a4be6cd
-
SHA512
0cb7b6c2d8a85a37c53ef34518e18e582aaaa2a805ed5c6c1903b13c3eac7264c05fb29afa58723d9289caf1faf3b5c0d4e82b29bca4e7baf1254aade1f15bb5
-
SSDEEP
3072:HRSMzqd+KR++J9cXnOHZAfsj4JKkDz4Irfm8WgWSnA1swWjLrQtnCoTmpN1kSl:xSuqUKR++LcXOHOfAkLrnGSnnjYCKmLL
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2756-6-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2436-14-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2436-77-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2928-79-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2436-199-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2436-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2756-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2756-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2436-14-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2436-77-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2928-79-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2436-199-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2756 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 31 PID 2436 wrote to memory of 2756 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 31 PID 2436 wrote to memory of 2756 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 31 PID 2436 wrote to memory of 2756 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 31 PID 2436 wrote to memory of 2928 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 33 PID 2436 wrote to memory of 2928 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 33 PID 2436 wrote to memory of 2928 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 33 PID 2436 wrote to memory of 2928 2436 JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_128bb43a3670a9e839bd989ffe857c83.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b24bd112f87d24ead2384cfa6c683c44
SHA14b77b50f16bbd34a46e2aa497c6bd78511b525af
SHA256a8cc27043e5ad439d315ee0198007645baec17626b19f77d9f5e31a3d7f23859
SHA51268453ddfdeae0f804450ebdf7423617124dd44ffa93fd66cce5be9dbf3c24443ff4b42a807a50486beef7a5eeddd2c28aab7e2f5616f001c046c2307adcb9b3f
-
Filesize
600B
MD514a388c0d3d6d9024f60f3ce708789d2
SHA1393719a91aaf334f942a3d3986cb18065930f19c
SHA2563c05ac83eeab743f1a4604149213d06ed0dce3a60b86ebbcc80b42757aa5cbda
SHA5121895899877297781be1438a4828e93ecc4051b7fdeec4611e215a1419ffd25bbd585ea76b81743032999e0603a4bb4ff70e1b83be06188eee83c75ed8f0c8129
-
Filesize
1KB
MD5c35e6fa474f084aeed30f09ed6c2a8bc
SHA12cb0e23d53321c44d38a00c15e3eb164b3855af4
SHA2565e752c6bf446a439c13a9c997c60803693e54eac7a07559567c373bc1074e5f6
SHA512e3498fcc32064ad12913c3b1e3a032d83b92df85431230dd88e56a892153664cfd31928c7837ae3c5cbacd5096a21680d9d0100a4aaf5e6bbf6e2826e300630b
-
Filesize
996B
MD53bb5cdeb53dded42ecb3d05e0a1225be
SHA13b02fe16e1e789f82f63dabb2ff026d277f467c0
SHA25620df5fe700948453ef91649099116834a750dd9e088c3223eb0d5087fdd8f46f
SHA51272085061e95e836fca85c08ca6223bf4fcd13770c627b6704247bd9d6047736ff374a82dd45b601a73b1bef44a3dde67c5427f4bc6fc6667f1237c77e155e5a6