Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 13:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe
-
Size
179KB
-
MD5
588245bdb4ece067ee35dd21b49eb2d4
-
SHA1
d2b4f7c9337ce90c2a2170a2e65084d8d01195bf
-
SHA256
247096a0f8ee29d360de5e01a089d2345b820e83bfa9175518128a98dfd0975b
-
SHA512
cecbe71a9a41af7f20ccc5f52206ff06474a38164da504975a44489fe71b458bd5d584a97234961b9c1678a18c7e3022e84d78f3798f89723884d5f6f8321d37
-
SSDEEP
3072:HlvjWfBYXoPw9N6mILzoWHP2k08ANvT2ztGKiuuMlMSifHmML80tsJM/y72fd:Zj5oPw9kzjHP2h8+TYtFOMRifHm95r8
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1408-15-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/4152-16-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/4152-82-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/4384-86-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/4152-201-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe -
resource yara_rule behavioral2/memory/4152-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1408-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1408-13-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1408-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4152-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4152-82-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4384-86-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4152-201-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4152 wrote to memory of 1408 4152 JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe 83 PID 4152 wrote to memory of 1408 4152 JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe 83 PID 4152 wrote to memory of 1408 4152 JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe 83 PID 4152 wrote to memory of 4384 4152 JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe 93 PID 4152 wrote to memory of 4384 4152 JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe 93 PID 4152 wrote to memory of 4384 4152 JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_588245bdb4ece067ee35dd21b49eb2d4.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:4384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5af6630160c01cd7a2f0b84d10b02218c
SHA11b4e555e7208ad7428a63315df1a523ae270398a
SHA25680fe7c0bdf8be5ffa75d07a3f3f322874fb7bdc78135a7815512d191085663a1
SHA51286c5f89fd02a48b3d2c2ac1d844d601f0519045dadb18e81bb1150b0be46870ad93536018233559a356dbdb4281088f0f24e79926d231f51f50c1d94eef75781
-
Filesize
600B
MD59e3fd459d1c355fc368825fd792d4aca
SHA140ecd0c5bfedcb6ae54c9a15166653095ce66be2
SHA2566755d0ffca1ef62ddf726cdbff86d4c884616fec6c9c1051a21da8ef0e550f1b
SHA5124d64a0cc611f3ad0b61c753e850a377704ccf4023c5b889e461409f8d667b82f3b059031354b0a0d5e22fe268e746a23a020a7252f47b3d512a31bb86688f599
-
Filesize
996B
MD5eee2bf788814e8d039494a8a19df0453
SHA1fee3a550658fb446edbc6bb9e96ce3de2433abb7
SHA2563b65a6ef4719f764d23279dd1cefabde3161399e4fe9443171ddb5a4f70f0c50
SHA512aefb278b937411ae374976b7a3e95639453fedae1229c372b3cd21ef0bc1feb6093706ae84379b61e033201f90585bcda1c580099b0cf5f7637875d1308660e5