Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 20:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe
-
Size
190KB
-
MD5
2e4ba5fe3ff3c09b5049855e8318659b
-
SHA1
6b411b314c2ee902d85ee5991ba2d37d5c1b9334
-
SHA256
4edb9b51034fc17d3d2ec81c55291fbd0d8b77ef65cb3ebda421d5240ea7ef92
-
SHA512
81273ba5b2a66bd0e8932ee5d80110a286e340eff9cb48ca0d6b44683282b4dcbf7995ae3501d468c14358d373d62e2779887c8fc73389561e5dbfbea5a1bf8e
-
SSDEEP
3072:ehp6MQRMEJMxrYZCX2lx775d5NSpu6s2Wcy4rYnXZpMGPa4eRskmKgKWlPIE:ehpmFMdPX2lx77efs2WcyHnXZfax+KA
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2784-7-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2128-14-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1040-71-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2128-72-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2128-173-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2128-206-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2128-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2784-5-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2784-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2128-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1040-71-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2128-72-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2128-173-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2128-206-0x0000000000400000-0x000000000046B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2784 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 30 PID 2128 wrote to memory of 2784 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 30 PID 2128 wrote to memory of 2784 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 30 PID 2128 wrote to memory of 2784 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 30 PID 2128 wrote to memory of 1040 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 32 PID 2128 wrote to memory of 1040 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 32 PID 2128 wrote to memory of 1040 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 32 PID 2128 wrote to memory of 1040 2128 JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e4ba5fe3ff3c09b5049855e8318659b.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ca69b8982bb2a787d556eda8f3a77040
SHA1b8c03c13f456038b3bd627818ba36a29d62b6349
SHA2565ef9dfd6f4b12d736d190812d8445ec49c84473d02d9fe0f52d2b47d9ceab5de
SHA512f0b07a8ff1f9630a9d7ace3b981042a98d7f85d025804a0fbecc5be1ca6fd3931f884d29cbf050eb74e98d48785facb2cd9c2098a656a3f505b3d4524af1d109
-
Filesize
600B
MD56282c545b1ba0d12a4c70bef187e4101
SHA138bf400608f58c0197b21ea82e5b80aa5b79d25f
SHA256f5c767dd5577ec57fb6efd159778736998532ecc39c0ffe67694dff1516f00e8
SHA5124178d3203bc192bdee75d66698f5ee630af0ac0b9c1b9e7f0cdd3061a48a61b8cd610b725bee40fa3e94b760961fe14985a366f52ea9180acf01a04c2daedaca
-
Filesize
996B
MD5be84e043b85cf61c1ca105123dcb7311
SHA138144262886acbb95a370037bb7eff5b6265e35f
SHA25649e239a634c73dd76203d548b00714550599055e03a917bb6e44dbafe2f1578f
SHA512ce9aecc85b320b207f2949c72e2e6390b29109b8df23e65fb0d87225327aff5bdbc5ea34730a8b8782af21764e763d841fd66159040a77f8978c06dcbbc8ee48