Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 17:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe
-
Size
174KB
-
MD5
f3b5c71429882508a16b171bfd6e3d50
-
SHA1
5ba90d177031465c2b8d9f94090884d882ec3d17
-
SHA256
4c102f72cf215c188ed4000a47eb09e8edf82c054a36e0eb3d95093f2adba2e1
-
SHA512
d9a64d326b031cc3f400b7134bc39a2d99f57a7590fdcbcc5be794b95b2554947a6d527e4d25540e945a3480fee853e533018b6d51d7d3a0f795f44d587c6073
-
SSDEEP
3072:2vW+2IUadlM4GD8hzSyM6kb5G1zIRObix0AoMBiOKoYkEI52Ap+hlmlzeHh4/T8I:2vW+Br6epkb5G1MRN0cBiroYI2Qlzb8I
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2156-8-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2904-16-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2904-81-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2572-86-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2904-147-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2904-2-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2156-5-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2156-6-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2156-8-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2904-16-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2904-81-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2572-84-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2572-86-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2904-147-0x0000000000400000-0x000000000048D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2156 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 28 PID 2904 wrote to memory of 2156 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 28 PID 2904 wrote to memory of 2156 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 28 PID 2904 wrote to memory of 2156 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 28 PID 2904 wrote to memory of 2572 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 30 PID 2904 wrote to memory of 2572 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 30 PID 2904 wrote to memory of 2572 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 30 PID 2904 wrote to memory of 2572 2904 JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f3b5c71429882508a16b171bfd6e3d50.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b689392d842d93cc0ac8d786626bf990
SHA14d818abb9c10a71337306f9e60aa652b21ac404e
SHA2568e85c01565947cf6211dc7e350f951d1a232434e21d7820114bbbbdb31c0e5f1
SHA512cd0dc02e97e096b17caec94731b4b073c7ae7615e5858575e32aebf38be5d12e03e040a1b0829afc13a9aa2409a03ba3c830df00d75f5a35aee1f8028f0dcbf7
-
Filesize
600B
MD5848262b0b4d04d96c9b044d24a25ed06
SHA1a0c7309647462fbe5616cc78147ee54031ed87be
SHA25663894ac803a5df6a68af7521a72be3f7ac40e80edeb4f532442dbbabeb5c74d2
SHA5121984233fd9baa2ac68a4c1f56561b6a8d8ff93bff367e2f7b540210399b35dcf7f08fe5ae2efb1dd67dfcf6cb9490be277bc40473fa1e4609c3e9a0a74fba104
-
Filesize
996B
MD595d4d1bd64d7f6fd70089436e2b18a5b
SHA124752141ad6917bb8f43e9aa3c4205ba9418045d
SHA256f25bb6030a7ee0bba064d8b52873eaa45dabb16bbd055caebe0ec3032a1bf80e
SHA5124529cf589d90c061ae170a2a64228bec6c70f24165bd66c6869eacf9455feab5399c0be85b70bea16d96056001935576f8c34183d4075d01858bf10a3e81af67