Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 03:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe
-
Size
173KB
-
MD5
bba1b455fca21de2e8cdef1e7dcfbf82
-
SHA1
2915600ad44bbcf6289ed49fd345f97bb78f235b
-
SHA256
2b202ef18edb1d72af5edaa644f18dc84e51e6947c03d966d0d9c22d4310eed3
-
SHA512
5ea0e8b39510ad57e134bb957c409550ea8159694a6c621ab601a3bb57fc8ecad0eeb48f0e10a359c00ef0929ca4d9995dd459e4229db9bacbe6f7a622b8d741
-
SSDEEP
3072:dyaq7sGql0/RTw2R68dm6E9MJl1f9ylp2NWzj+sjdL77dZCwt:h9GqaJTBdmF9MJlV4iWzjLdn7
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3988-13-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2716-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2716-15-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/3708-120-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2716-121-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2716-295-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\D8F9C\\F0D14.exe" JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe -
resource yara_rule behavioral2/memory/2716-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3988-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2716-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2716-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3708-120-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2716-121-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2716-295-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3988 2716 JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe 83 PID 2716 wrote to memory of 3988 2716 JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe 83 PID 2716 wrote to memory of 3988 2716 JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe 83 PID 2716 wrote to memory of 3708 2716 JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe 88 PID 2716 wrote to memory of 3708 2716 JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe 88 PID 2716 wrote to memory of 3708 2716 JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe startC:\Program Files (x86)\LP\14ED\E87.exe%C:\Program Files (x86)\LP\14ED2⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bba1b455fca21de2e8cdef1e7dcfbf82.exe startC:\Program Files (x86)\9CAC2\lvvm.exe%C:\Program Files (x86)\9CAC22⤵
- System Location Discovery: System Language Discovery
PID:3708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD567eed8b960be840b01b29f5eded8f5bf
SHA1dcc2725aedc0c0b8fcb1a43b8cff7687353a3c66
SHA2563c7d5e949eb367bbb938d53be18b10d7cb33a66558a394a29149c62bcb9293c2
SHA512f7d4b31fe16f08a8290bfe5a94d93d8f4a017681ec437ca16a634ad0df48b3fbe439900ca0474fcc1421100a48933bd73213ae240462e3493557d1549e261c53
-
Filesize
1KB
MD507aeb67753506e231680670dd666937c
SHA1e6ec3a2fc73c01008f804f0c4c6f8f0aa0d26ff5
SHA256799cca3ddd58dd288ca0fde8892dfbb8f18fef689c96af943f374782c6edde1f
SHA5124ec7c7914586d554f700543117c895957d059213c2ee9202c3c3a3849fdc6a6e8f929fc9516b7b73dfbc73768a1d7eb21425f8e39e70a4a3c13ce5fd9b42e2ba
-
Filesize
600B
MD5a92f1c4b7a04597dd2ba35ecfa9687b6
SHA1eb91c7f29b5647b137288deb6399f4f75536e024
SHA256e6469cbb5fc836ce56a8e24485b9430a6363a41c218308bfdacc364a65491f25
SHA5129c4a5a9a88c448bd4177d7b4590adc6841af8830c77e0f0ea2ec8a8e0de9b0e89abd6d693828bdf2d717557d006998029cc2f71b6c1973ca6fa298387688bd1c