Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 01:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe
-
Size
183KB
-
MD5
668c1ff3722c38ed44be150edc679a30
-
SHA1
3cc40e80144b2972a10043d1cb799cc1dfad30be
-
SHA256
75609dded5b09da047053ec8f8481c0de75f0656ab24bed8d32820fe6a90863a
-
SHA512
e60696f389847b94b9b060814b82b3fec9b0db0bf472306e461a66ad691f036f68dd0254213aa52dfba51a0d29e3ec1330a1ec2203da6763f377df0c0d43a121
-
SSDEEP
3072:7qjd/dUiDkMtUfGoLQG2C0hONqvgEpRIHS3ZkEXWErUxG+Tgv49AiB5EWoybQcBm:ejdVUraUeoU/lhOeRnNXWbxG+TgvhU5U
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2880-8-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3032-18-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2564-82-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3032-83-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3032-175-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3032-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2880-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2880-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3032-18-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2564-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3032-83-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3032-175-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2880 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 30 PID 3032 wrote to memory of 2880 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 30 PID 3032 wrote to memory of 2880 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 30 PID 3032 wrote to memory of 2880 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 30 PID 3032 wrote to memory of 2564 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 32 PID 3032 wrote to memory of 2564 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 32 PID 3032 wrote to memory of 2564 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 32 PID 3032 wrote to memory of 2564 3032 JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561b7f4327d360c44fa0da5e6db9d2e66
SHA199d0a94f84e588b4885a366ff7c08a4b049eb8c8
SHA256094bebecb751ee9962acc5efec1eb42094d116812e8d8061cbb25a94aa569d9f
SHA5128ca65e249b7d970c3b96a7d80554df24ce3fa95512f8a4821b24f258597d6ab5dc4ce34f2356f4634418c40a3dca180a12f64e7d08d6fd602ab6f29dd46768d4
-
Filesize
897B
MD57398868bde76846bc6c1c3861af2d994
SHA1882a218c7fdb8cfc773bda0b70ad2b1bcd3905dd
SHA256a7fcf41de82136fe134eaf1d2f7694eb451f91d6d85001b7e91e6bcbd9281a09
SHA51247200d84689c6c4531489a232988eef384fc9963363d52ff95120cbb1037a6f80ac48a66c4083792ad3294a7971da172bfb137a88850c75727b68a1ef451649f
-
Filesize
1KB
MD5ec21d70b5f70800781a51cea127af094
SHA19aae14c5ff57de58f43f897f1948269b5d6d0186
SHA2560d366cdeb269147866c5b8e04712d7fb4987153cff5b9984d491ac39aba5c41a
SHA512f57dd8dd538f4d7c91a3dbfc701c86b4acdc6eb6dbb86593821a2bdbf8885a0a8cdbc2fb174f274fa084f1c8970041c581d3af14f157925bb642baa1fc863cd2