Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 07:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe
-
Size
176KB
-
MD5
c0904ab24a5a0e48dfb08d76ca712de5
-
SHA1
468ad4f177dc3c32df32bb3def9b9fc66235a044
-
SHA256
4e2aa7d3a94acef5e2a6736b6e3e184cbec99697b751041bea9a1e57c1747939
-
SHA512
5c6bf0fc5480af65fc6b5e2e67b537538596d396122e8602cc925298d14452f3a385101276baf6a2c02aaf78a83c2bc04eec0d82c3d2a377cbdb8e0293721bfc
-
SSDEEP
3072:aQkKoPSA0Ywm1dS/x8Qkp8uHy0ZhcCMN6g0Ziw7hiKivDqVsdXHxJWRl7xFTkAiV:aQkKo6/Y5dS/xzkhy+c10Zl7O2VsdXRu
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2036-14-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2428-15-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2428-82-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/1968-86-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2428-203-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2428-2-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2036-14-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2036-13-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2428-15-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2428-82-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1968-84-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1968-86-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2428-203-0x0000000000400000-0x000000000046E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2036 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 30 PID 2428 wrote to memory of 2036 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 30 PID 2428 wrote to memory of 2036 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 30 PID 2428 wrote to memory of 2036 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 30 PID 2428 wrote to memory of 1968 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 33 PID 2428 wrote to memory of 1968 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 33 PID 2428 wrote to memory of 1968 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 33 PID 2428 wrote to memory of 1968 2428 JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c0904ab24a5a0e48dfb08d76ca712de5.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b6ee2036f2896f7e5e15fa988d46565c
SHA1c47f8f30e359685629a5e8ab5ebd94d1da7f67e4
SHA25675ca34c055d4ec9a4a0a65e5f0f19afd7269bfa045c0ac41354d9660027380af
SHA51211bfe082e863e2ead4ea0a44bc3f2ba1ecc638c171e39ac2fd2b201c94a34bc74896a9d20607df91d5f64146b412bfa9a4841f54b240e476ba377f860683aac7
-
Filesize
600B
MD559d079fd4c071ac576b7b895a628527d
SHA1316acd9c1ab58edbe4b638543442d9e6a4e38e34
SHA25615188a1772adc20c89186c33a18c08ac648f4243a862556560ae95bdb77c3444
SHA512a44635c57dd6e768a38c671866fceb831ac814241a1aa36e2f7a0d89bb0f7f2a961bdc6ebc383c4fa18bfbabd382970bfaedc537aecdc003ddc6533d8f482a4d
-
Filesize
996B
MD5a890ff29ccbed44df287f947da397cd0
SHA1f9c21ca0d7868b6272d3086c5d6f93e84e126246
SHA25648b69958843dbb8d8656c03a4d53014744f287c04c27aa770e417510dd2cfdc5
SHA512bcd2e324fc400949a9a194ef677edea225e34e5aaef6041babdef3c5afb02b71773016b33e62e8fe49c58d36ac81f899c0b1d53d8944c68559919fd4362392d8