Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 03:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe
-
Size
177KB
-
MD5
69ceb7f4c6e602400dc93637ae94a4b1
-
SHA1
333c45c68307eff607cd802d6558775b0f9845a8
-
SHA256
1b9973292a4f821f661853620f588e74c12c7b0f5d5e2cc98dd9c4051762a874
-
SHA512
3cbab37b9531b036b800e206b518497603db392d807c11c434d8222e2daf7c156c14ca1212e9b45f3a50a367ed961ee3de6f59e3cc00da03c812cc97a4dfd594
-
SSDEEP
3072:o3RXLWmMt9ZeJJCErPUezCBjUZWiRzH2+zvt5iqVIENYhsZYbTaCewNZhumXqaHX:8dWHHaJrs8CBj+WiR2+Lv5VVNQsZYb8E
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4168-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/1776-125-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-126-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-304-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\DF414\\77105.exe" JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe -
resource yara_rule behavioral2/memory/2596-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4168-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4168-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1776-125-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-126-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-304-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4168 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 82 PID 2596 wrote to memory of 4168 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 82 PID 2596 wrote to memory of 4168 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 82 PID 2596 wrote to memory of 1776 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 87 PID 2596 wrote to memory of 1776 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 87 PID 2596 wrote to memory of 1776 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe startC:\Program Files (x86)\LP\059D\000.exe%C:\Program Files (x86)\LP\059D2⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe startC:\Program Files (x86)\1409D\lvvm.exe%C:\Program Files (x86)\1409D2⤵
- System Location Discovery: System Language Discovery
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD533e6de7694912cefcca682905a7a96ec
SHA137fe272ee40e456afe4cb46ead93e5e112ec4645
SHA256e58ef5656d97e937393922a41ada1d9680d3d59d864c89dd9f66b5bfd3315da2
SHA512cb0f64636a20f3cc8455a805045ffb220436653e4a20dfd525201cade3ddf687849a63ee5a388ca0e5ae651c96302f6f739f6bc9d3766f822c9d8c58ba49559f
-
Filesize
600B
MD58e810394a4ce12f9490d6ffdca313c9d
SHA16f44e8ccd344b74d3c71ae241cf70cae621710be
SHA256b3d7b2ddb6acc19ea61a33cc89bec1ba7ca21a86a301d92d8cb3b7a9289608c7
SHA512e419c7ab8a4a9175643a53b566cdaa744e6cdef51b6b8c37600690044ee4ddc7cb8c7bfc359519737f89577c7963be7b69fdf13c21fb8a66988b0d36c00db606
-
Filesize
1KB
MD57e53c82696a82acea17e87e88215ba73
SHA1645e5858c03629951437847698c2822aafb3c61c
SHA2565388be864b40e714ac7b4d8c27beec98131840217151e88ebceb7a3bdb7a438e
SHA512aff4d88b6732c400c5e792c05df0beaf0d444cdf99eeca36b3f041abfa29935247ed6f15889bba1fe81032cc2d43eaf29c0739771146e57c26ef265d30b3b0f3