Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 19:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_16d7669579c92f0489de1db86786e809.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_16d7669579c92f0489de1db86786e809.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_16d7669579c92f0489de1db86786e809.exe
-
Size
177KB
-
MD5
16d7669579c92f0489de1db86786e809
-
SHA1
05e8608893494ddb9bc590b33be92f748fa5f774
-
SHA256
7a349f46b9cbb2817d534f42f535a644c53474c34b4dd33c1eed3abb897d5f66
-
SHA512
de0a53998fdf9d6ab533c2b3b58f7ec144943e05d8adc2d5f7d43f9883e3f1fff2db4de51a9082d136a0e7be82a594decea8b2a6e399787df103859b101228b2
-
SSDEEP
3072:xDfR/290JzmWEZI1aWOm2BszvGm+mLZY78gTK6Ove/FbdqRK2:xrRLzmmaJBszvimlYLke/e
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/3036-8-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/1892-15-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/1892-16-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/3036-81-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/1892-80-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/608-85-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/1892-86-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot behavioral1/memory/1892-151-0x0000000000400000-0x0000000000485000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_16d7669579c92f0489de1db86786e809.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1892-2-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/3036-5-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/3036-8-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/3036-7-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/1892-15-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/1892-16-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/3036-81-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/1892-80-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/608-85-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/1892-86-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/1892-151-0x0000000000400000-0x0000000000485000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_16d7669579c92f0489de1db86786e809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_16d7669579c92f0489de1db86786e809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_16d7669579c92f0489de1db86786e809.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1892 wrote to memory of 3036 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 28 PID 1892 wrote to memory of 3036 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 28 PID 1892 wrote to memory of 3036 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 28 PID 1892 wrote to memory of 3036 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 28 PID 1892 wrote to memory of 608 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 30 PID 1892 wrote to memory of 608 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 30 PID 1892 wrote to memory of 608 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 30 PID 1892 wrote to memory of 608 1892 JaffaCakes118_16d7669579c92f0489de1db86786e809.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d7669579c92f0489de1db86786e809.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d7669579c92f0489de1db86786e809.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d7669579c92f0489de1db86786e809.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d7669579c92f0489de1db86786e809.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d7669579c92f0489de1db86786e809.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d7669579c92f0489de1db86786e809.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD597afa3799b19eb3d6331a25708a367da
SHA123b12593ed2e1808d9c00f944fab604b2fc13036
SHA256e687e07bd75643af0d98fdca1b8c8740f01f9f60af2cb7a5ca5b93727edea1db
SHA512df79f43b5d11e881036ed2b3919d325c76aa4c11762c6b2e0734b5c18332586c7dbb4252ed6cf8cf890e46181f0aa25ff13054266de11919639c159d1075d25e
-
Filesize
600B
MD5d907bfd0fe22a413bfef94eb32456717
SHA15ee8e9810e1efda23c56a1778b2b660d239cef94
SHA2564f3ec9c372ab78c0a6685873461029761df56d612b4ac67111e71c2ed369dbb0
SHA51216ef88e89f7b79de497a19a9c5a75ea54d30437af7d71f8e5ab5366761aa778f21a6804f247d3b910a35fc8206a82558b2a13e16f47832b0d5fcd2b0e144542b
-
Filesize
996B
MD5ae60ef1741247dfceea29a43a2e45ffb
SHA17c6c021899049020f4e64dee25f75d624fe593e1
SHA256b2005aa3e7f7507604f165cf22127f2b7fe9e8d4abc6b24b3bec98f7949fe649
SHA51259bb733892e8f2074d0632a4adf2a124c5c1560f1c5fab45a33debba4e52694d2d74e0f87418440d7791c13c758d0ed504f1565d5b017a85018672f2a9f8b94b