Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 19:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe
-
Size
169KB
-
MD5
94f779ece253d16527cfe0c19b38da44
-
SHA1
37ac208a182607742bd30fd1928c6850dcbadd46
-
SHA256
19049d1449268f54ba0b168b2a34bf85e42ec9f348cca8c7f68d4ffae5c036d5
-
SHA512
e9c20ff322e38a8546fc9552c4fe494c8efea85e66f1038b70382050304beed28f94aad9eb29041170978d7bc262ed26d5374763a4b4f76b73474419f677de5c
-
SSDEEP
3072:zvb3LmAF9cNgIDhvLGtzBxx2u0mqBI1WGVovBzJ9MrkZMaC:3Ug6vLGPurzBI4tpF9Mv9
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2800-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2632-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2632-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2800-74-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2828-79-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2632-80-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2632-176-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\2A559\\AC432.exe" JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2632-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2800-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2632-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2632-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2800-74-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2828-77-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2828-79-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2632-80-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2632-176-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2800 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 30 PID 2632 wrote to memory of 2800 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 30 PID 2632 wrote to memory of 2800 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 30 PID 2632 wrote to memory of 2800 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 30 PID 2632 wrote to memory of 2828 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 32 PID 2632 wrote to memory of 2828 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 32 PID 2632 wrote to memory of 2828 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 32 PID 2632 wrote to memory of 2828 2632 JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe startC:\Program Files (x86)\LP\32F2\5C6.exe%C:\Program Files (x86)\LP\32F22⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94f779ece253d16527cfe0c19b38da44.exe startC:\Program Files (x86)\595AE\lvvm.exe%C:\Program Files (x86)\595AE2⤵
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53b7d342567ac5ee3db0a2c68dbc4dc36
SHA17459c93f514f5e797d8aa3e0762b6bc5727bf84d
SHA256ac9d6be9cabad0482d83978b3b490402660d31209624d5a08d439ab2415313a5
SHA5125024e7ac39a6bb0dea9237dc4460a35c0edd3f106529f4c0631c626788827eae8928443060651bdc5f03179caf152531333f4963a1f331cf8d71c721c7e78ee0
-
Filesize
600B
MD5422f3716c8b3dad17c5e31ac249faed9
SHA1959b447b226929ea8e0c452512bfd824d131e0d2
SHA256d0107b466e4e848b1cb26175b032bc239d35bb17aa4a9dffb1f1f4ee2f38cf1e
SHA512ce12ffd0a7907a0e026e49e5409669b6189a3646ccb931cb8c3e43cfd699e2de89da4857d036d27c12f040740223a15d66844a873a7cf446a230ce8af5f2abaf
-
Filesize
996B
MD507e3147f966b32dbcb2ed5e726336d31
SHA10f936a1659d4694f78fa07657e7aa39f3da210cb
SHA256355c54777785a5551a65f7d383aaf402930c776a307878b654d0d007674dba93
SHA5121d63b561f8f02a9491ac6c3a04fff8fae2d6be991fae61d5578127019ea33905609231a57393ce3881aa3740b5923be673b4ed5d0f1153ef4fd18f004a87d4ec