Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 03:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe
-
Size
178KB
-
MD5
34473d67fd0b8eedd313a26ae1f5f9a0
-
SHA1
8bf27e0489a6774df30a4e72d951eee1c5fdbeff
-
SHA256
a0587260a4dddae640878f7258e1880d6e9699598138acf2f3152383f485a5c7
-
SHA512
1cb3f58287ba8d6d0aaa5b517f87b22c7c8f8c81b2a4bcfda58ab08103361ac8142a3ada0408275447544397086ef4b9c7d8d932d88d477c63a6eb83b6d68785
-
SSDEEP
3072:HF8h3rEGnHZfg15j6o7ouFD5txqo5rjuv+Q3ZWTZHv7nhR1cJCd8ahjau9M17mjw:HF8rVH1C52o7lFAo5OGQ0TZusd82/9M7
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2240-8-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2240-7-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2068-16-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2068-76-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2504-80-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2068-175-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2068-2-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2240-5-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2240-8-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2240-7-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2068-16-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2068-76-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2240-77-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2504-79-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2504-80-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2068-175-0x0000000000400000-0x000000000046E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2240 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 30 PID 2068 wrote to memory of 2240 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 30 PID 2068 wrote to memory of 2240 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 30 PID 2068 wrote to memory of 2240 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 30 PID 2068 wrote to memory of 2504 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 33 PID 2068 wrote to memory of 2504 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 33 PID 2068 wrote to memory of 2504 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 33 PID 2068 wrote to memory of 2504 2068 JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b20d896d5494b9e60ebea81ba5ea0bc1
SHA1080d51f4e9061c93ed0d18eb33785a696bedf65f
SHA256a9f895f6045ea53bfcf826e34890603cd8e0df0aa7d8bb2da4092d8fdd589611
SHA51205d5f862e1eca54e21caad686c687dc4d885359f14df3318075e2a75481b69f5c3f4c908957a6a24fe239bb23c6136b99dd36f84544970dbf11f449a755c37fd
-
Filesize
600B
MD56616639334ee9fc3a79bf7205115186a
SHA1ae2a272a32370311bf5a00972deee74228bb0e1d
SHA256641982aeff0872e3f8bdc1941beab1c80256c90145a543f7146c1a148392a997
SHA5128256549203f59eec53e44501d59f956b7816b80cd9bbbdfaeb4b2416f405d2b9a93747fbc00cfcfb17d9c6a9d6808d53f4a624ecba94846a7b18fdbfc2f49526