Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 11:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe
-
Size
176KB
-
MD5
a8b17aebfcd64862068ee2635acaff35
-
SHA1
88e58562af8f52527c7ad4bdeffb1e138cbc7f7f
-
SHA256
23c0f4cd9090b3e3f6b5be673dc8bbab70431f4736cf05f39fcd854527413ae9
-
SHA512
e87c11a5d3b132db23c1da47213318890b2c35857dd789d52309475264f5f98f88f43c91e55d7f5ddd07f9f3c3caf0eb77be8ff047f1a090f4bb729c25f8fe78
-
SSDEEP
3072:/CsNAKJx/U5K5X81JAhMcQM3+2Kl9Vd/PwmJ35I7EFEes5iPMARCksh2c6JNB5oS:/DAQG5rJgMcvgl/Pwc36OpXR+hF6z7bX
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1692-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1592-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1592-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2856-115-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1592-116-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1592-294-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\9A4A2\\C0BBD.exe" JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1592-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1692-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1592-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1592-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2856-115-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1592-116-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1592-294-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1692 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 30 PID 1592 wrote to memory of 1692 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 30 PID 1592 wrote to memory of 1692 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 30 PID 1592 wrote to memory of 1692 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 30 PID 1592 wrote to memory of 2856 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 33 PID 1592 wrote to memory of 2856 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 33 PID 1592 wrote to memory of 2856 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 33 PID 1592 wrote to memory of 2856 1592 JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe startC:\Program Files (x86)\LP\BD19\96D.exe%C:\Program Files (x86)\LP\BD192⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe startC:\Program Files (x86)\A2E70\lvvm.exe%C:\Program Files (x86)\A2E702⤵
- System Location Discovery: System Language Discovery
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD520b8540dc977c687d793dd70699d038a
SHA165aa3aadf3af72b0dcf8399ad4e014ca2299433e
SHA256af38d5c536f3dfcbfc36bf567d76ba3342fd3477e8d6e3e89504553bf3776cd0
SHA512ff87a01e36f7faf7171fe0631c95d36682ce4ec2ae7e0cfb8ada941e61d2295c16785d7b7a56de0af985a24bd4188ac9ad1ce732276876d44f4842f9c4b24233
-
Filesize
600B
MD502166759454e8fd55c947211e26b2b6f
SHA18c1ab2d01e1dcdad0cfa9b981f48aad344448089
SHA256ab076e7539cb1cf780d0c2991748ec311b657833af0c3272bfa35cfd3be4ce5d
SHA512e398755e65eeba9b7208df07d454a8e59d250089a93ba6356da67f551afef710a7797e948ffca5308c48aba026210391b848fcb3c0cce299fb1ccd698a70c010
-
Filesize
1KB
MD5a6949c0570e9f8fdc0e293f1c85cdd1d
SHA119690decca62e2fa9b30ca03f3d2539e9a9633c0
SHA25614434016678ff76de13ca9d02d2cda991258557b43da0773b0f05ae5975178b2
SHA512d1b9e5346edc2d3b7ea10aed672de1977bcff052afb01b91c0e7af06390f20f2917a104b697a661d037eb5210b2a5cdbafda9547541b65bc68d3fbbcc78108ce