Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 10:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe
-
Size
169KB
-
MD5
3b29383007fb7037bab2fdd8fa9e34e5
-
SHA1
01ff35d931c930fdad49f5d1057ed4bf36905744
-
SHA256
17c875fb6b85948075d5be4f6f887780fd1a28d901174b3a96a43bd478f2b738
-
SHA512
42ee6c866a609869c01682e17b221de5a3968e37ad0fa80afa202aa3bff6184227d07424993536b257a44c5b6736fcff11253f87bfb32ddaea9e8e5c7df574f1
-
SSDEEP
3072:LQ9X812u2T/BjSkLKlkyHtzuRe4xvkrBlOCkGacw2bIQ1yDGb3VAFBnpurFrNgm4:LQIEjSOe6RIWCkGx0D63uF5EZBZPiqCD
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2300-15-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2688-16-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2688-17-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2688-80-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/284-83-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2688-180-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\49017\\94FC8.exe" JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2688-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2300-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2300-14-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2688-16-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2688-17-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2688-80-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/284-82-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/284-83-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2688-180-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2300 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 30 PID 2688 wrote to memory of 2300 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 30 PID 2688 wrote to memory of 2300 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 30 PID 2688 wrote to memory of 2300 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 30 PID 2688 wrote to memory of 284 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 32 PID 2688 wrote to memory of 284 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 32 PID 2688 wrote to memory of 284 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 32 PID 2688 wrote to memory of 284 2688 JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe startC:\Program Files (x86)\LP\C884\747.exe%C:\Program Files (x86)\LP\C8842⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe startC:\Program Files (x86)\17005\lvvm.exe%C:\Program Files (x86)\170052⤵
- System Location Discovery: System Language Discovery
PID:284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e9bbded12b31e7dfc661968d3b891d20
SHA12cf4e6720e5d7395f79cc2dc5fd00e539c5e9a2d
SHA256c1979c471c760d7247a6dd5ce28c08198dbca80e53e30280154f614f1bcebd4c
SHA5124db1994f684327d632c71888bc2e9e1a34c3552e00d9eeb6448003cd43f7d673c128180c5953394e18a2a345ee95cb30d2ed82ab231bf7858dbf49cd7e4191c3
-
Filesize
600B
MD594544c2d5309f3688a4ea2408c625d13
SHA12939a81b2588d43507b5fc2953de7a0d02e2d86b
SHA256912d33dbd9447626a65d288f9b5a6b1853b38eff15666b9ec84be1ab5bde3a91
SHA512b50f89e7b5a530be146e1f0f20aaaa72aa0bfff85598c19d173541a6800c193da5bd600517a6802159d2de9d29e5e35a72bbda01c5bf3dc96675482f946803d9
-
Filesize
996B
MD5d1e629eb150fb913aab92120a126b574
SHA1afc05406850c9ed54de56b10a05a7cfef5de8676
SHA2565c47c2ecf966cd3e57a3d8855e4bccbfe41b6a7b21a873f299a5248ef4e2a448
SHA51236609a6891bbb9097c1abd772e93fcc7d57b0202385306d333a7f4c30d2df4c4839b095b25f943d27d5825fa48165c1055e57f529dca2d8d2870e26a1cd4d4a3