Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 13:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe
-
Size
165KB
-
MD5
17e28a792f2fea781c5038ed34ed2c05
-
SHA1
bc2156d0821b3b1deb963aaa7443331781cd24a4
-
SHA256
66c501de1e311ae66ba47de335de4e16a8e3f858076498a8e3682853647dfc3f
-
SHA512
ac7f4aad1eb07479a62950f5e520cbd1c1ba08340fc24a7420f0eaa61010ab3fdb706bc2adfbb6782edc25c74c3cd5959b71e52f6adc07f4398ec17999dde9a8
-
SSDEEP
3072:7PlW+AhhuDcFQjXtMPXoJ6Q6QLl73qKk3cY:blWRuDcWX+PX7Il2KkMY
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3440-16-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/3960-17-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/3960-18-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/2040-112-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/3960-113-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/3960-263-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\2D52E\\9E42C.exe" JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe -
resource yara_rule behavioral2/memory/3960-3-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3440-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3440-14-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3440-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3960-17-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3960-18-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2040-112-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3960-113-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3960-263-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3440 3960 JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe 85 PID 3960 wrote to memory of 3440 3960 JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe 85 PID 3960 wrote to memory of 3440 3960 JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe 85 PID 3960 wrote to memory of 2040 3960 JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe 100 PID 3960 wrote to memory of 2040 3960 JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe 100 PID 3960 wrote to memory of 2040 3960 JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe startC:\Program Files (x86)\LP\2CC2\F46.exe%C:\Program Files (x86)\LP\2CC22⤵
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe startC:\Program Files (x86)\2EED7\lvvm.exe%C:\Program Files (x86)\2EED72⤵
- System Location Discovery: System Language Discovery
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5769fff713e43117efb48e16d04f365e1
SHA1bfd8f47bb05fc0d29894b4f486a8af5801639525
SHA2560916d83ad97233305a3e9d77a70ce442fc92e721581e1c789af61b620e4a1689
SHA51273ebe0e77bd8a25a4c4bb2358db835000f3f051c63025a27b8cb5a0cb074285ca91974b65774bd9d0bfafa7df220d676459bfedbf030b4f25c60aa68a3b27bec
-
Filesize
600B
MD55a31d794b082b258e75bd73a3b21b9b9
SHA172d01463c35ebfd0a9b7e8051087f1ffe24d4907
SHA256c7d08ce5e86365a7b7ff4fca942ea405ab0f602e3c816f5a910c0072d3f0d3ea
SHA51233d99bb61dbdab14aea2f00c83d3a7a1df4d826add783bf89805dea1f7272d1a666aecf1b73abda7eb83086ca155e6cf14519b18195c8c47db733fb801372faf
-
Filesize
1KB
MD5e76868e54b523dd17ecf40bca74a8714
SHA1699c97802703cdebc4a2463aafab0a67607da3f9
SHA25668f35024d0a3cc4ee4e27bc7d37bbca2bfe9bf8edb552ca4e1d30ed3a79263c7
SHA51273a1b2c205cc86dfdbe952549f09823aa4a36615a509e51b59fda01ff060d63f7bdb97710b5635160da0dfa1d673be8cd92eb09bb940b6928e73e62aeddd3de1