Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 17:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe
-
Size
173KB
-
MD5
7dae07bd36ee342c0cb8eb165721fcbc
-
SHA1
3dce070abde87455b42cbf7b30461da42f99d2ea
-
SHA256
1a591be854fb461c5eeaf424bf50c370dd547a35e0e63f6b70ce1e49021f2d00
-
SHA512
ebfeaf939edf39d6bcbf2f1911d91508351670a825e4c849c11e4c0ed1e20ecb9f44f42071e986c8234280d3bb30161536d0096901cf0334ffa7223b44ca0000
-
SSDEEP
3072:mlzKHalGCntghiP+q2xmQQQ75RvDabe20LtO+Pfwl/e/+dHXTkbqHV+yLLmO0jEJ:AKHphiC1zGbWzXwl/vVjkOHVNX0jEk
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/1668-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/560-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/560-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/4708-126-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/560-127-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/560-297-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\41AFF\\6D852.exe" JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe -
resource yara_rule behavioral2/memory/560-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1668-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1668-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/560-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/560-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4708-125-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4708-126-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/560-127-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/560-297-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 560 wrote to memory of 1668 560 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 86 PID 560 wrote to memory of 1668 560 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 86 PID 560 wrote to memory of 1668 560 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 86 PID 560 wrote to memory of 4708 560 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 92 PID 560 wrote to memory of 4708 560 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 92 PID 560 wrote to memory of 4708 560 JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe startC:\Program Files (x86)\LP\5284\9D9.exe%C:\Program Files (x86)\LP\52842⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dae07bd36ee342c0cb8eb165721fcbc.exe startC:\Program Files (x86)\FFD26\lvvm.exe%C:\Program Files (x86)\FFD262⤵PID:4708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD557e4b3248fb4107b0418631791034ee7
SHA1c210c9a3b1b4df4a092ce6128686d984ce3ce1d0
SHA2561bcb5168bd8caa4257ce915f19d226e6470cd33f10d21cc3c410de18b4b1259d
SHA5126bb320f3d80c84b56d263cabcdce1da593937315a19fa3d8b5676cb6234405a540641f23406018c4d72719c2f0ff6d34b8f43084d429fc5b8a4a2fa42889f34b
-
Filesize
600B
MD5de942b748264938b7e16174568b14585
SHA197536b26cd9e83f1e2a60324cb8bfc86b10294eb
SHA256421c97f86756c3578b92379414237b8868cea1ab6cc50e709077d6cda46b07be
SHA5123510b5993060a2e3bbd698cfe909b7e4a60dfccc2e1ff3fc59bbea0344b13a396d4d88b78644d6b85d09a8f8bd1d27295f92314dbd6ec2570efe9d4dcce5c154
-
Filesize
1KB
MD51e5e28b7aa2b6bd1891e9b2a8b6d9e10
SHA1869248c86a84257524e88e2786c8249b07fd4412
SHA2560a463a8623a93f08dda734c8c7c61c805aaaa4ed8963fc8c6cef7caf0cf6a0d8
SHA51257f363047ab793b5a005099cfc9910dfdccf03f24126a661356fea5820a00885f831739ecadd7b5556fe812d8c6ddb2a6c7a18d0cd78d086aadc3cfc1e1b4ae4
-
Filesize
300B
MD57c56ad40cd454dcbf1eb4c2405790a38
SHA1e834dc1b149f3b5ad27e6d79fd7d0c29649b71f0
SHA256312223e6d450fa11f3ee9d1b62564c2642e5ed914b1fe9cc5e2bb7a4e324c255
SHA512d77bf9512f29a68ad4d8571e3522313f56badca455607de55cf271e158f2c1b15c6f560e4a68adeca3fc16d4a49630af9fd44d6492122692ce4cc1fca63baaa1