Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 16:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe
-
Size
177KB
-
MD5
5b9142d6316eb42620f9c0a51d58e99a
-
SHA1
419d6d02b650d0a57b5c3a37a4abb7c6553c1363
-
SHA256
2e07ec34fa646659226d4b004bdadc0da6f462e8d69cb88607b157b52cc32d6d
-
SHA512
76c7996aa7f5219423da232c862586a311c106fd7f76b392bf1fd12e683417592feeb5262ec45be39bdff6d515bf579678c5cb800fa483549876f3dbd20436c8
-
SSDEEP
3072:tRHpQhbq6/CQuMOEg2Iuqvrr4RP09xZX787esJoOErMDHqD9jh1:tRHq46qQ52uqvAR0z5Ie4y4+Dp
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/2760-12-0x0000000000400000-0x0000000000496000-memory.dmp family_cycbot behavioral2/memory/1452-15-0x0000000000400000-0x0000000000496000-memory.dmp family_cycbot behavioral2/memory/2760-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/4484-140-0x0000000000400000-0x0000000000496000-memory.dmp family_cycbot behavioral2/memory/2760-141-0x0000000000400000-0x0000000000496000-memory.dmp family_cycbot behavioral2/memory/2760-303-0x0000000000400000-0x0000000000496000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\F666C\\AEBE9.exe" JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe -
resource yara_rule behavioral2/memory/2760-2-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2760-3-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2760-12-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/1452-14-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/1452-15-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2760-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4484-139-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/4484-140-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2760-141-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2760-303-0x0000000000400000-0x0000000000496000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1452 2760 JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe 84 PID 2760 wrote to memory of 1452 2760 JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe 84 PID 2760 wrote to memory of 1452 2760 JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe 84 PID 2760 wrote to memory of 4484 2760 JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe 87 PID 2760 wrote to memory of 4484 2760 JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe 87 PID 2760 wrote to memory of 4484 2760 JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe startC:\Program Files (x86)\LP\E93F\873.exe%C:\Program Files (x86)\LP\E93F2⤵PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe startC:\Program Files (x86)\6C974\lvvm.exe%C:\Program Files (x86)\6C9742⤵PID:4484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5a228084a4e0d111a6fad74df0c7f2747
SHA15b94e36d5907c670f520af4a681f6e0b7c6a1574
SHA25647cb0ac17db20e44e2ca2c07b689ef3567b98c692ef350ce489c44ed12edd66a
SHA5120989ef648e0e6b3896a3d66dcd2773c7e609a54315384191718f908953c52a7ccfec8a47376a0ff924f937a14baca782bae67b4954a7197ed17ef8a2c2e170ae
-
Filesize
600B
MD56a9e81f3f8e369dd7f41070f276e8798
SHA1233fbed05a791ce6c74382d3352958e71a2c59b7
SHA2569070d09f9e0a2e728fb3595f43ebe76a9c09669523dd4dad3fb6566eb6f1e78c
SHA5121d1270a6c97d82a5055d0c7eaf30a7bab6f475529e93d8e5870cd1a4f579a09372078be990b1958b8894220ca9cf583ea01dfb5f900b3e1866153e833e9142bd
-
Filesize
1KB
MD5c737069cc57a4d8ada38ebeea23cf5d1
SHA1789fb1621867c9bdf25e32f0169bff3c35a6e099
SHA2563ba17a49d8828d700c1b75f6058316e936e20bcf31d6fff717d63c489318defc
SHA512aabe69d144735446b5adcc9224dd49e1025508b0b7135d1c8f0ac0cdfaaacd2aa6fc38cca17435083410da756c941fba92fd98ec2ad4c17752ee8373b8bcedff