Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 22:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe
-
Size
177KB
-
MD5
0073617452e565600638d5fd0eacbc06
-
SHA1
6a424cf725b8f11f9fa06d25ab751f92aa877387
-
SHA256
2dd62314387ddb349ef02b420be993317d930f4b6a3d75b05eda95aa79b976ac
-
SHA512
ff811c74974adf0c02019e0ebd100054e67425be862d03e2cb0e38cd2934da2478dfdbd949c943943bf98b34ebe5b0ee13bb0a78fdb29c86798a185713046477
-
SSDEEP
3072:foWxa8ej/V1f6O7rX4HhAZ8VSuTitInIpuLwkAjanQ++/tr9AXlNzE/EIQ:foWQ7/VR6OgHOC0gI+R2L++1YlNo/Er
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2900-13-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2884-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2884-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/1972-130-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2884-131-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2884-313-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\C14E0\\62783.exe" JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2884-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2900-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2884-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2884-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1972-130-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2884-131-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2884-313-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2900 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 30 PID 2884 wrote to memory of 2900 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 30 PID 2884 wrote to memory of 2900 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 30 PID 2884 wrote to memory of 2900 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 30 PID 2884 wrote to memory of 1972 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 32 PID 2884 wrote to memory of 1972 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 32 PID 2884 wrote to memory of 1972 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 32 PID 2884 wrote to memory of 1972 2884 JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe startC:\Program Files (x86)\LP\832C\E62.exe%C:\Program Files (x86)\LP\832C2⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe startC:\Program Files (x86)\E0FA4\lvvm.exe%C:\Program Files (x86)\E0FA42⤵
- System Location Discovery: System Language Discovery
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD52ff9ea255b7d89af455a605f79eadebf
SHA1e7ee7c76a611396db5b1afc2e86f54668f9f4f14
SHA2565df4498810b53db13e3e143576261d67e7200106fe604c2aec0b42ea3dd011af
SHA5121e676bcfc5b4a2fc14435ac66cc05cbabfeba85b83779e6972cb6c0112ac6ca8da92ded5fe56f37a5891f9e1d30c5c351930863595546b48c838c9dc55536597
-
Filesize
1KB
MD5d83d25fdad5d877f316a9084eb8d1562
SHA1501952094fd136ef54a2a90202c2d9fbbef135d4
SHA256f08393c3d9cc07c6b13eedf5cf58fcffb9628f2aa437065726b81f2009d2d3bb
SHA5124b9c9ef71316f1b3ffc54bd315616f2381b452484cc510351137cf6cfa23e622060f4416e8c7fe3e7db06db7a7bf94ffd2aa7880beee7b22bafb6e388804b61c
-
Filesize
600B
MD58b39e5da509687f473cf8abe267a3bc3
SHA18a44dcd13bc38dc3510aec63ee4d8a3170d09700
SHA2563bf560fcee1cfab1187de33188a3fa8c61f8e6d0ad08e2a45680580922e4ae09
SHA5123183f636f7b3a76e9e05c30e0fc54ecae1fbc5dabd9d2134ee1e50fab36ed233d26533f913039c14288759b57849ea4f01acaad649e5213c2dff6a1a602c21af