Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 01:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_33113fea902553e5867b933e4876a93c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_33113fea902553e5867b933e4876a93c.exe
-
Size
165KB
-
MD5
33113fea902553e5867b933e4876a93c
-
SHA1
94d85e74a821cf6403ae99db51cffb761b973a84
-
SHA256
19f2389fdb85aed301d76f4a096931e02f05ce40cea7baad98d8b19a92240799
-
SHA512
58a0b9a059b49bf49726c0534680160bc57a81b4faa886b8d0b303eb97422ccecde83f5d8ca2feea1affdd93a92b734cd8f0ce54f7303d23bf0c8c897cf927bd
-
SSDEEP
3072:KeyENP7FGU0uOU6RBUM9d77HbvstVKNvgl15B3CedTUid94fUG:dNQPuOzH9J7mVKNIdCsN
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2120-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2108-18-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2108-19-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/332-120-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/332-119-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2108-121-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2108-291-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\DD4E7\\AAF5E.exe" JaffaCakes118_33113fea902553e5867b933e4876a93c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2108-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2120-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2120-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2120-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2108-18-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2108-19-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/332-120-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/332-119-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2108-121-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2108-291-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_33113fea902553e5867b933e4876a93c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_33113fea902553e5867b933e4876a93c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_33113fea902553e5867b933e4876a93c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2120 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 30 PID 2108 wrote to memory of 2120 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 30 PID 2108 wrote to memory of 2120 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 30 PID 2108 wrote to memory of 2120 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 30 PID 2108 wrote to memory of 332 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 33 PID 2108 wrote to memory of 332 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 33 PID 2108 wrote to memory of 332 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 33 PID 2108 wrote to memory of 332 2108 JaffaCakes118_33113fea902553e5867b933e4876a93c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33113fea902553e5867b933e4876a93c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33113fea902553e5867b933e4876a93c.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33113fea902553e5867b933e4876a93c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33113fea902553e5867b933e4876a93c.exe startC:\Program Files (x86)\LP\5E1D\424.exe%C:\Program Files (x86)\LP\5E1D2⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33113fea902553e5867b933e4876a93c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33113fea902553e5867b933e4876a93c.exe startC:\Program Files (x86)\E7695\lvvm.exe%C:\Program Files (x86)\E76952⤵
- System Location Discovery: System Language Discovery
PID:332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c233f024bab6569905b5198eb537d7ea
SHA16d4300d9ba04ea3cbb0cfb6263afda915cc7f574
SHA256f38cfab9933f246fe8255dd0a60e1b2bc21eef2decc0d9cd10fafd39a0f948ca
SHA51285c731f41b338ec0a38e0d20090cd0d6b1aa6bc1877cfde78622ae6e5bcd212011c85b0f52a3ef984be3745de2097b63e1b398628234a60d50831dd3d126618d
-
Filesize
600B
MD5d40c5f2b2a024f926d3ea4e3d5cbab77
SHA1b700e7e145e5d9e0f795b175b5ba8501daf5099d
SHA256c3f1f2faa3113526905a55481514ef64aca33c1e019ab390e28ddbafc2f856e7
SHA512db661a3b0bc41e4a18e10d64f17cc120ebb1870fbac7dbc6fe21e66f64845fc9f66711b33af321d4ce238ad0c6f6f3b1c741ab9a3601865beeb4957632b95b5c
-
Filesize
1KB
MD52d399f9e6be290a3df26f6a9df315753
SHA119fd665b91c6e9c742ea8759ad376feaf2cf58cf
SHA256861ae56a4f47cbb68e67033dba41a251f49d7971e26ee874387b327d0615e502
SHA512ed8910c2c5cf112abce5737600c88a4d3d5414ecae73c1d2e2d5eb5c62958595a239b867be1dffe593140519024a554447257638f5cd909e7250e2a1bd80044b