Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 17:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe
-
Size
166KB
-
MD5
41f7f2200cf39489f99f82ef1ab727d7
-
SHA1
c6af8c603910a3c6edd5600ff0d849c6d169cd23
-
SHA256
2c18b47588f93746be9eb64908defaef48fc3bee1cd06cf9b05c0887cc3d62c6
-
SHA512
68ae4c8c92800bfc8cd7eaf1801d9ea408f3932cdee4d909ddaeef2cdbfa7c9436e13d6b077a21eccaddb08fe453476f19fce79e11c6996e9434a1c1960e5ac7
-
SSDEEP
3072:Tqx0uMqX1Lkhk7CcjCcwikH2Z3YCx8gl7KFSAo1KUDRXiweGtGK7QmT:TqxgqX1LkhktfhkWAgpESAoKeRXiOR7T
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2512-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1752-18-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1752-19-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2804-118-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1752-119-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1752-269-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\1D655\\DBD8E.exe" JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1752-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2512-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2512-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2512-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1752-18-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1752-19-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2804-118-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1752-119-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1752-269-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2512 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 31 PID 1752 wrote to memory of 2512 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 31 PID 1752 wrote to memory of 2512 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 31 PID 1752 wrote to memory of 2512 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 31 PID 1752 wrote to memory of 2804 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 33 PID 1752 wrote to memory of 2804 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 33 PID 1752 wrote to memory of 2804 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 33 PID 1752 wrote to memory of 2804 1752 JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe startC:\Program Files (x86)\LP\8E31\D5A.exe%C:\Program Files (x86)\LP\8E312⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe startC:\Program Files (x86)\554AE\lvvm.exe%C:\Program Files (x86)\554AE2⤵
- System Location Discovery: System Language Discovery
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5127dbc1c4d4814d8a1a4648b6bd30e50
SHA1eaa398d0d9dfceb388b7fdb1694026197021f4e0
SHA256b99ff5367f13753ad0373a24434d53e85d3d8bbaba2963daf58e07d10aada8e5
SHA5128af46eac685fc7834e6d28e58face4b3549ea548e77525093a00a7bf81e9f0c4c65d80457bee3bb8a8cd0bdec30c206b618f14dc8b259a0d515e5bd9ad02f0ee
-
Filesize
600B
MD5e449197c7f8744f9b693c85c2596a930
SHA1023998c33a8f780945332f249f53914248fc022f
SHA25616c886caec9814227842724ac10060172233519cbfb3f009109d060554f953b3
SHA5122bbea183e1eacb67496e0812b09a6e8ff2da76f4bfaa7772d75fbac2547826c78efbc3145ca754ab3a3ea7cc013e8f71a53b8328116636305d2b5e34af86da81
-
Filesize
1KB
MD521c207a026bb3d40cd49c77d9e1cf27d
SHA11b02f2e940fc4c6a5b55020091ed3df4a3f037d0
SHA256b1b19cff45f309a654874d6d44a2dbea72b4932db7e566aac24b8cd064252119
SHA51213ec9b759f716a41b70680d1480ce082f24ea16004e8bd11297011238d3df47647a8dcaf4eb97c93f6045b78b77d32961b4657d08be40f78827f3e4c532d1b25