Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 14:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe
-
Size
174KB
-
MD5
7892fac82ab62b2b006373ff7db24c40
-
SHA1
8c5a0b0506d6dcf9b3ab5fb6822f217167365079
-
SHA256
1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2
-
SHA512
e882b2b39f5c9a4c3a31081235bbe1f3375b14b91a98ed369ee4845c411163140e3e2906add14946a05e2eac1d7d7ba9e00fcc228781b7d36fc3314c1d0e7f03
-
SSDEEP
3072:8pRtjHU0Kgvu3BPbBniNxZYotlCSo9TyhW4ViLFWbVs5BJhUcge:SzHU0KgvSBPkaTnFWbVqzhUcT
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3520-13-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3348-14-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/3348-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3348-70-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/1816-73-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3348-178-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\B816C\\FDED3.exe" JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe -
resource yara_rule behavioral2/memory/3348-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3520-12-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3520-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3348-14-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3348-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3348-70-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1816-73-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3348-178-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3348 wrote to memory of 3520 3348 JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe 82 PID 3348 wrote to memory of 3520 3348 JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe 82 PID 3348 wrote to memory of 3520 3348 JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe 82 PID 3348 wrote to memory of 1816 3348 JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe 88 PID 3348 wrote to memory of 1816 3348 JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe 88 PID 3348 wrote to memory of 1816 3348 JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe startC:\Program Files (x86)\LP\D3AB\47A.exe%C:\Program Files (x86)\LP\D3AB2⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7892fac82ab62b2b006373ff7db24c40.exe startC:\Program Files (x86)\6C871\lvvm.exe%C:\Program Files (x86)\6C8712⤵PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562ead4ed17b4f9df551193c1b65eda40
SHA1f6dfec8a7b81b9b3f3aac419fc204e07c445318f
SHA256563f64a9f37047430dc616fa6e46e9b4753a699f60a03658086af84fa5f3e576
SHA5122c85595e99a342774b1ff172c5b839c425c7ca2b93b450f0d18896519de34115a30856c772db7221235a214375d59bdb261e8f6f7409a8e6a0499309dfb88811
-
Filesize
600B
MD5a4e7e64deb98fb4933683057683dc40c
SHA12973d7caa1e5aaa4b1567563d716cc13f5983bd0
SHA256cdd314cc6bde7266cf6d6ba47d1b79b745b5eb012230c28a9d2df4a28e8c9db9
SHA512c251c6dd471c87f65580526fb100ec4b1e80bf8a14595b17a255cbfd2cdfde9005d05072b0c186d82420c316287ed34cb038b6c82abc30a38dad2e24627541fe
-
Filesize
996B
MD5c6e0b8c0104155fe54a7adc47b4b849f
SHA1cfcbf28dd34c6c1fd3bba1dd70d3709b378817e3
SHA256de935346506a664b0a79812a9b6f9a81d16755b83d66608448c47a8818acf23e
SHA51260c3b26d1c107c0dca5ef7a308f2cae1af5ce28a9822b9fb598ad33d35ec0ee56201383ff81e9a771499ffb5cfd2efd0ed89a15d741717f5beb061c6a1c2a676