Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 15:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe
-
Size
163KB
-
MD5
7ac3fe0174fde0e9d7cf160feccd7d36
-
SHA1
d8164e8b9785fc64e8f6dab6007420cecf731291
-
SHA256
17130b19c4f253fc868435a307feacc17ca163a23f5624243fb627b19ba544a0
-
SHA512
6e273ac47b862f8c9de33695010f9755ce48af3d9a8c75234735b60c953acd68ad3de80580cf5fb7fdfa80dafe8f9c122f88ea984feabb24f5d45a37abc0a872
-
SSDEEP
3072:Za3Oc7/KTefrrHMqvw7kIKuj1hZWzRj1qKwx5+c2BHj9ivA:ZFc7/AeJvw7XLjdWB19RxHM
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2668-13-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2968-14-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2968-15-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/1444-129-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2968-130-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2968-304-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\EAEA0\\93024.exe" JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2968-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2668-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2668-13-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2968-14-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2968-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1444-129-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2968-130-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2968-304-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2668 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 29 PID 2968 wrote to memory of 2668 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 29 PID 2968 wrote to memory of 2668 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 29 PID 2968 wrote to memory of 2668 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 29 PID 2968 wrote to memory of 1444 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 31 PID 2968 wrote to memory of 1444 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 31 PID 2968 wrote to memory of 1444 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 31 PID 2968 wrote to memory of 1444 2968 JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe startC:\Program Files (x86)\LP\24FE\9F7.exe%C:\Program Files (x86)\LP\24FE2⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ac3fe0174fde0e9d7cf160feccd7d36.exe startC:\Program Files (x86)\A07E7\lvvm.exe%C:\Program Files (x86)\A07E72⤵
- System Location Discovery: System Language Discovery
PID:1444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD51a992ec48327c3973d6d7c4bcb244405
SHA18cdbcbe57f1245c66010006c719f78e4e3f63e31
SHA256b08082a47516c20db1c00d6a57afd86ed9ec10fdc65083a3afc1030b77223fcb
SHA51296dd3bf30d4a72de1281fb09824d1c54112a93ba061043bd11631bd75bbf96fe003be5722fc7ad987dd42643eec1cba5a4eca850f12c9f78fd03c853a0a7feb9
-
Filesize
600B
MD5f780c91af779f55e1c6e5490475a4d7e
SHA163edc48e4e724989f76c0e04a2d889a01793a72c
SHA256b9674f65f23532753af4f4bbe7a8195052046b85c1af479dae4f7253d3dd4e68
SHA51225b2feff1ac216a5de6909f04214c83ea86a23cce1a33feb1659bfa4a819c768690bab0d5e163ea89ad9ffd0abe406182a3bf2766560bc41cf3d26df522434be
-
Filesize
1KB
MD56b7b590f00771a523f9c7045c11776a3
SHA1a6a284cdff237b55beddb0315b65295abcbfb882
SHA256e58038867ab62e899e0110c54eaf023336a31de414570ae270fa23e9c7ead161
SHA5129e54b0296e31257ce4d505efe40c6577d8a305080eb48091b149f84d9633912b8804ac1e6de4021f9459f8f663600286eb4e9075d1ba9411261423171bd9efe2