Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 19:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_601235d805470d07c077163c6017b584.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_601235d805470d07c077163c6017b584.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_601235d805470d07c077163c6017b584.exe
-
Size
175KB
-
MD5
601235d805470d07c077163c6017b584
-
SHA1
4fb03564ee9dd28ecf3664a460ee0112c4da5915
-
SHA256
9d47e8a561e316e9c40ba27cac8c229c01ec1e5c7657f05a6eef176e5943d957
-
SHA512
88a947b3b1ef1680f55e7205ee884a992f05da10422b008e748114dcd1222c6cf172fc5b3550fe46de2a91ee6160a6d71bcfce52282802e836ac5fe907b2ea9d
-
SSDEEP
3072:i5c9xUdzO67/UxERxx+kNNZqf4XnmmFHTmQcAVg1y85aQ2oODU8h4vZKQi2+:ugUJUmxx+ym43zH6QcyXbBDU8hJ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2068-9-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2120-15-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2300-79-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2300-80-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2120-139-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2120-181-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_601235d805470d07c077163c6017b584.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2120-2-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2068-9-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2120-15-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2300-79-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2300-80-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2120-139-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2120-181-0x0000000000400000-0x000000000048C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_601235d805470d07c077163c6017b584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_601235d805470d07c077163c6017b584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_601235d805470d07c077163c6017b584.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2068 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 30 PID 2120 wrote to memory of 2068 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 30 PID 2120 wrote to memory of 2068 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 30 PID 2120 wrote to memory of 2068 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 30 PID 2120 wrote to memory of 2300 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 33 PID 2120 wrote to memory of 2300 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 33 PID 2120 wrote to memory of 2300 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 33 PID 2120 wrote to memory of 2300 2120 JaffaCakes118_601235d805470d07c077163c6017b584.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_601235d805470d07c077163c6017b584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_601235d805470d07c077163c6017b584.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_601235d805470d07c077163c6017b584.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_601235d805470d07c077163c6017b584.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_601235d805470d07c077163c6017b584.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_601235d805470d07c077163c6017b584.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c0a6b2fa9be67034b73a32cfaf1594d5
SHA11db8e63ce1f382987032af8623104d3cddb4b6fa
SHA25677805fb3f1ef173d544fbe60a3ef0cfea260364808334837c6391a276a0f3d60
SHA51237484cca743ac6a94004f6c4729fc753e9b85c6029914d655396c248fc16390c5221f0bd5986bc3a66f82b2d6b6c52a41544e19bb026becce44748c43e05598f
-
Filesize
600B
MD5ef5b0ffad36369e3ad467628a179ca4d
SHA16425abfff8e12afefb929183eac292267eb0d922
SHA256922fae48e3edf7e9cabd5ab72ab67497e15de974aed8eb35f466a04b24aa4265
SHA51264d6fd8a2e0cff8b547bfb38a61b8b69102316a1e89efd442785ae2a6c085c76fbc812dc3d68d72e972212fb099099245c5828e8dfccd380201bd386187ac39b
-
Filesize
996B
MD53a4be53afbe4a539de915f920c88cea9
SHA143687d58275323b8e3a8901026d052be023cbe08
SHA2567c0a9f65210cf88bd48a10329e904fa8825670b52022b68e8a7c52b76d3407e1
SHA51260b85b38d0721be970a9d0e8f08002ba53545223a2a381cd9111c50996864861ec22c3a92cf0581164a3596211c28c8e25c217b1b7464da7ca64fe49f97f8d88