Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 22:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe
-
Size
165KB
-
MD5
b5e0270d0b80dbfa5576d55e1d762c08
-
SHA1
1477b9677e5b2f4a8f786dc3968e87c51ab3d141
-
SHA256
21c1f4911cfda2b312d548a050dc4270cb9e764115746eacfa2e3d8f87daea09
-
SHA512
6d20a9278fb1a1276ab30debaf7282ed627fed461666797a6c66e9452a5f289ce3ad9d002dd195da889ccf626194b02a0eaaaa8f3f7d87d873c97af52997645f
-
SSDEEP
3072:Hiw0IZJ1/pFFPySAip8OfKAYwcOeZ1It+cz4dT/BazCjklBwIIyM:HKIr1hFFPbpRKEcLm+cz4YCglU
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4704-20-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3576-22-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/3576-21-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2576-129-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3576-130-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3576-288-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\9CEE5\\97B0B.exe" JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe -
resource yara_rule behavioral2/memory/3576-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4704-19-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4704-20-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3576-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3576-21-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2576-128-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2576-129-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3576-130-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3576-288-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3576 wrote to memory of 4704 3576 JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe 86 PID 3576 wrote to memory of 4704 3576 JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe 86 PID 3576 wrote to memory of 4704 3576 JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe 86 PID 3576 wrote to memory of 2576 3576 JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe 88 PID 3576 wrote to memory of 2576 3576 JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe 88 PID 3576 wrote to memory of 2576 3576 JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe startC:\Program Files (x86)\LP\0B09\619.exe%C:\Program Files (x86)\LP\0B092⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e0270d0b80dbfa5576d55e1d762c08.exe startC:\Program Files (x86)\E5F97\lvvm.exe%C:\Program Files (x86)\E5F972⤵PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5e1d9f128465d882dbdf00b35844f9186
SHA1c1aabe813996b8965aefe92030a9143123a1190e
SHA25613574b4b667de608c8eb0e1e0100f5c55503db5fe0a5af571b1f70e1a8eb559f
SHA5123683c631874c97833bd47e94f05b6dc0ceefc3f6959dd643bed385504aa985ba8897d98d573e6054068aca43966248fa586f01fef962cf9d29cff3a15dd3856a
-
Filesize
1KB
MD57a544fe480a1056a75a89d2f6a382b17
SHA118945daf8d92bdbee5522ad9ecfc23f8fe3529c1
SHA256cab87c847ab7fe9d4ef513fe7c375f98942183d3ff6a8692c0d9cda887bc907f
SHA512dd5cae118c2a4c91875da2f1514ffc5ac7249730c7910deee914ce196062d3a921dbf024775b9f6c5f49b2fc1df259d067c9e020fff36673ba78ef9fafeca008
-
Filesize
1KB
MD54519c8aa714b8d1076d3d1b3868abed7
SHA11b2cb65d59ba9133793ba3505e797e3616fa35db
SHA256fecd7ea3651ce33ee7cb3a67d029fc2af0293a5f249f384fd2c34698ed0625de
SHA512b2aa6e222eb7a2e80f82060a644aa09c891a633b021bba55ffcddb8fb8032fd68870ec697ec6e279da507a42978d5373c9f8dfb999e1086dd4f9f5e7e1d40673
-
Filesize
897B
MD55ac46fc7cf8bcbdcbde975d08f2bca08
SHA11a592b6b7ee6546d4d1248577a5dc3547cff2d49
SHA256ae0ae8e7b55535a84e569ab1dd496bd0bb6bdae4e587bb05d6d54d10de7bfe60
SHA5121b8808a99646e7a37183678df40ddf2a33d0c4582f3eb789111b61bde2c8748b341fb6c5fa335fb2685776d9508e68206c92cdbda453722e499d3db5d7b9c5b0