Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 17:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe
-
Size
173KB
-
MD5
7dae07bd36ee342c0cb8eb165721fcbc
-
SHA1
3dce070abde87455b42cbf7b30461da42f99d2ea
-
SHA256
1a591be854fb461c5eeaf424bf50c370dd547a35e0e63f6b70ce1e49021f2d00
-
SHA512
ebfeaf939edf39d6bcbf2f1911d91508351670a825e4c849c11e4c0ed1e20ecb9f44f42071e986c8234280d3bb30161536d0096901cf0334ffa7223b44ca0000
-
SSDEEP
3072:mlzKHalGCntghiP+q2xmQQQ75RvDabe20LtO+Pfwl/e/+dHXTkbqHV+yLLmO0jEJ:AKHphiC1zGbWzXwl/vVjkOHVNX0jEk
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2944-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2944-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2420-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2420-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2744-141-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2420-142-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2420-292-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\5BA3E\\AC432.exe" JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2420-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2944-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2944-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2420-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2420-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2744-139-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2744-141-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2420-142-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2420-292-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2944 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 28 PID 2420 wrote to memory of 2944 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 28 PID 2420 wrote to memory of 2944 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 28 PID 2420 wrote to memory of 2944 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 28 PID 2420 wrote to memory of 2744 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 32 PID 2420 wrote to memory of 2744 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 32 PID 2420 wrote to memory of 2744 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 32 PID 2420 wrote to memory of 2744 2420 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe startC:\Program Files (x86)\LP\32F5\5C6.exe%C:\Program Files (x86)\LP\32F52⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe startC:\Program Files (x86)\3EA96\lvvm.exe%C:\Program Files (x86)\3EA962⤵PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD58dabe0716eca104e2efbd6812fcecf9e
SHA1738e53db99f5ee797bb2d89cc7f657168e93bf22
SHA256ca91a6c18c7a51d60104946d2de14c43361078eb432b50193d7a9360e94eb84a
SHA5126e1870e465d51e3362facaa647a22d69357b51fe068d871f839d0ffe993688c0c62b1246436210cf2bdcc7ef747a80ab6c12170fea23d5d06c839e4bb1b08614
-
Filesize
600B
MD55eb40e2d43e10c285c90e80051384fae
SHA1386dafdfbeaaf3402b687b667b86388919d43bb5
SHA25671bd65a204a595372f04ceb87c3c13aa3c4326b2197a0ade2a99107611d3e227
SHA512aa7680305622e27c490d1b0c7cd4ccca30ee6b819b3925c1802975faa718f2741ac62c77e8980e626fb73ec3e39dafa3c5685f8a24a776e78bcfa8f421808124
-
Filesize
1KB
MD5f6847792e28407d7156bedeb4d145027
SHA1fe2b2acd8593b748c2738ddcd917766984ee96c5
SHA25693030ad21fbfeca94fbcb5918d2b89751d870b7872e46f1d8065b472a58663ff
SHA512969a61975494c4315817299201e777fd911085199986b95eccb3ec176e78281b81f3948887b947f1babed5bc4e980a058ad5da01e97bbd6ccddf6db325a221d7