Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 23:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe
-
Size
169KB
-
MD5
99a841432b22ac1af0ea0d77454fa7f6
-
SHA1
c5aa8cadaa83f71b214231a521580c8c0883c4a0
-
SHA256
a7e8a020f033172279c5febafa95cbf7534ab4410ece9e4d361c7b4de6134590
-
SHA512
74c460a47e7c666013c0dbfa0a6ff6ef9173a4a7a9935f70775da37e0e97659d34590270896390d4458035d48a21eec67c7c347892207a580742e57d691e64ec
-
SSDEEP
3072:R7x+w0QB9eePACXeAd90OFgeHWJmCzyYTxtur791cMkrezy:R7MQPDX70OFg/yY9QjkC
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/380-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/380-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2072-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2072-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2072-78-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/872-82-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2072-189-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\79394\\3C43D.exe" JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2072-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/380-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/380-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2072-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2072-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2072-78-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/872-80-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/872-82-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2072-189-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 380 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 31 PID 2072 wrote to memory of 380 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 31 PID 2072 wrote to memory of 380 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 31 PID 2072 wrote to memory of 380 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 31 PID 2072 wrote to memory of 872 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 33 PID 2072 wrote to memory of 872 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 33 PID 2072 wrote to memory of 872 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 33 PID 2072 wrote to memory of 872 2072 JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe startC:\Program Files (x86)\LP\B3E7\C55.exe%C:\Program Files (x86)\LP\B3E72⤵
- System Location Discovery: System Language Discovery
PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a841432b22ac1af0ea0d77454fa7f6.exe startC:\Program Files (x86)\94034\lvvm.exe%C:\Program Files (x86)\940342⤵
- System Location Discovery: System Language Discovery
PID:872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c470ede6d3839ddd700ae7f423110cc5
SHA1126ca17745ab621497584a3020853046eb09a2f6
SHA256a8e655c31a570423c30f769ddc7d457c8cabff3d4cf3b5864d9c2949b5651646
SHA5120507a5a281af7b9bb969e7264435984c602f1db0b1eec39e941de6c691e79da9858957fadc8cf5c59d9a13b96699e1712df624663106a6635aad84990d557271
-
Filesize
600B
MD551261da4a1c721fac5501351024537db
SHA1fbde5d7ad63e026a763b17889f96ba7ef6bcbefc
SHA256aa4bc4992a6b5cb3415bb8f92c9aba38c9c30bb13d3356201be2e1c2dde471d9
SHA512f0eda4bd62844599bd7418e710f32741b37994e5135a08bf5995d2a4704b30f39c73e19376e635390e6787373d239c46b16df0e011283b72e63d5b600276341c
-
Filesize
996B
MD5b6ee33dd7feb2f8dc596f6d4c83ac797
SHA16684e042d96dab92b960733515beba86489bd1b0
SHA2562220f9ed81f35739e0e946a8f102003aaac7dd453f986e2366921f0286dc0e20
SHA51263a18536a2a0b6e7059aa040d5f33de9b4cfdbd1d1185b8f8526f30ce9c4106be35d31c52c8eb362100b1c29485ca3d92e6be9f77d8fa0d081e8b623b32fb9cf