Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 18:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe
-
Size
170KB
-
MD5
101660b924b7aa18d196bd7b2b592ef7
-
SHA1
8190d88997c291dc3b5f9638528da24b62eff647
-
SHA256
c444be81f9a2675822afd8d3259c85f357947b3d391071ce4f627663f673e542
-
SHA512
b1cd2fdf92146f15bf60428673fbfc7c5def61b9ae2392415c2a03748319e8aa6885dee909e6b5a0829dc358a5ddb285baa723fc98af8b5d0cd23df72c07e3cb
-
SSDEEP
3072:AqmSLGkYoPrNdGYxfUfcl/W7UdFW6KKusTtrVKpY74CB+yAmt:1GRoPXGYxIcu7Udw6dTtrYpIL+y9
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2648-12-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2776-13-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2776-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2288-118-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2776-119-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2776-281-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\35DA9\\AB23D.exe" JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe -
resource yara_rule behavioral1/memory/2776-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2648-10-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2648-12-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2776-13-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2776-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2288-118-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2288-116-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2776-119-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2776-281-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2648 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 31 PID 2776 wrote to memory of 2648 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 31 PID 2776 wrote to memory of 2648 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 31 PID 2776 wrote to memory of 2648 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 31 PID 2776 wrote to memory of 2288 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 32 PID 2776 wrote to memory of 2288 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 32 PID 2776 wrote to memory of 2288 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 32 PID 2776 wrote to memory of 2288 2776 JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe startC:\Program Files (x86)\LP\3DD3\828.exe%C:\Program Files (x86)\LP\3DD32⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_101660b924b7aa18d196bd7b2b592ef7.exe startC:\Program Files (x86)\A94AF\lvvm.exe%C:\Program Files (x86)\A94AF2⤵
- System Location Discovery: System Language Discovery
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5437dff252d74742aed80ea9216328aa0
SHA16eef5fd9bdd47e97276f78434e969bd9503b9b24
SHA256e5cf1964011a63b031398cd97df2f77b3bfa6c15c495aa0eeb48275b9e0404f3
SHA51243571f959fe9741b407802fa074492ddc0a8a0a68275a1221fc0ecf492bdec546817c5be9300d3b749bda624ebd333c549d372109bdec9a11866cb002cce1e5c
-
Filesize
300B
MD58dc04809bce7926a4521f8a708dbe6d6
SHA180ec52abef8dd4bc2f0163f2e5da9655bc5fed91
SHA25660702c718c9afeb7d2ba39bf24e955ec616d70189824fc3345404207f98c4643
SHA51276c4b2278f882b17b3c9f12a595d4087de1e5ac9c0690a6335a24b33073ef93e17a287e8c2ada112f00bc424d1d04d794338a3340b666eb4af1eebf77afa10e8
-
Filesize
1KB
MD57e818b1f3ac4bc20e5bc1513321de963
SHA153e1c825ac5da5d898f0cdbe1adbff532e830aba
SHA2560a5cdc9a5816cecb78d66283f2d37b173cfa9706dc10ac6ba8d9f48943346374
SHA512562521ddac2c37a63d29d83d88720447d3004d5a8a56db298e4f944e97c7f8167b0cfd8c1c8151f5a7b6ca60095efc31d803b0cbb52906d1a163f8a3ce03124e