Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 07:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe
-
Size
178KB
-
MD5
6f885b5cf83063796df80de97896f57e
-
SHA1
7530ea982af3ed379ff8edb75d5656a7bd437ab8
-
SHA256
ab407357d168b1779cb6e2c9c978002c63c2708caba123f5ebc1aba99afe5cda
-
SHA512
267896d80011eb8499a86f61983e725eb9e025453cb9280e892d19ccf085ce294b5113560fd1da28e90797ab3cf31a62106e1f97bb63f262f2ef0ce7035d7b57
-
SSDEEP
3072:C2tNXiRKmPgTeVdH0bVr93DKkOwQm72+5/1E0J3MTpVh1zrCdDZxSx/iI:oKm8eV5eilma+5//NM9VTC1ZUB
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2340-13-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2340-11-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2732-14-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2732-83-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2600-87-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2732-146-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2732-1-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2340-13-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2340-11-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2732-14-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2732-83-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2600-87-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2732-146-0x0000000000400000-0x000000000048C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2340 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 30 PID 2732 wrote to memory of 2340 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 30 PID 2732 wrote to memory of 2340 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 30 PID 2732 wrote to memory of 2340 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 30 PID 2732 wrote to memory of 2600 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 32 PID 2732 wrote to memory of 2600 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 32 PID 2732 wrote to memory of 2600 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 32 PID 2732 wrote to memory of 2600 2732 JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8ecd1c13bf731a9037de48dcfbe38de
SHA1113537cd21e34004ea4c7e48f70309ab01a08698
SHA256656eafebbf75458d3d090c82c2e812aa530e9336606c7b05be39c96dde8ff501
SHA512f5db16143e5f1f177440bcf1c5ef6625000acf6e8c7e5fc6cdc4e6840be44ae8408f6c184036c20bd54021770301bb44204a4adfd0806feecbce9afef4c3a3b4
-
Filesize
600B
MD5f39d685e5ddf1f9b22f020e338ceed39
SHA14f7345fc7e7f7c881dee575b473f96d2c691d154
SHA2568360566e7b3bdec7df90a89a0d5626c65c45866eed90f0a691acba626f75cc3e
SHA512ca63a53684147ee4177e6512dedca3f3b4d578a4d69dfc6e813c3b996323972f1f1961d56e0f715e17552ce3389f5ad9f8e10fec241d1c02637537cefb614ae7
-
Filesize
996B
MD553deb05363d33bd838cf565e8dd5b8f4
SHA1f90cb498de07858de93d50318b568b09ff93fa4d
SHA2569e3a1fb172a27af18cccf80708e3aac66e64fb1d85ea0f88f6e7c3568a0a5326
SHA51254e130b67c9fa91fa714ed8ca83a5c64ecea7381734afd9f3ad3223d4f1fc3bfce5d79737a58455cc1525fb86dd94fe1e33678f4f6809ff54cec5eb0a19a8712