Analysis
-
max time kernel
141s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 12:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe
-
Size
173KB
-
MD5
3554b0cd570e8d29242b9cc31bb66fab
-
SHA1
f137a863bd7309896c243aa9a8a06bc70f5579d6
-
SHA256
906c5db5b81bb5b112ed6f3ef2d3181bb4869e82e4e3a40b775e5ecaed3264ed
-
SHA512
62a0e10a8df1ff48292630a04cc03105fa29fdcb6a7321d61cac911b7d2fab6554d2fabdce53f67583270264689d0499fd11b1721ae0eb1ee435508f8efcfa8a
-
SSDEEP
3072:02EXXq0sLf5/tUj8JxMHXKbMmQppXuNR7D0+HIldhkeFVFuf2jbU7xowAM:0j6prqQj2eN1jHIhkqW2UlD
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2380-13-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2568-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2568-15-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/3016-135-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2568-136-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2568-330-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2568-331-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\B3338\\73180.exe" JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2568-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2380-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2568-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2568-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/3016-133-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3016-135-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2568-136-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2568-330-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2568-331-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2380 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 30 PID 2568 wrote to memory of 2380 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 30 PID 2568 wrote to memory of 2380 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 30 PID 2568 wrote to memory of 2380 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 30 PID 2568 wrote to memory of 3016 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 32 PID 2568 wrote to memory of 3016 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 32 PID 2568 wrote to memory of 3016 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 32 PID 2568 wrote to memory of 3016 2568 JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe startC:\Program Files (x86)\LP\809B\F7B.exe%C:\Program Files (x86)\LP\809B2⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe startC:\Program Files (x86)\382C6\lvvm.exe%C:\Program Files (x86)\382C62⤵
- System Location Discovery: System Language Discovery
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD581c25f548b18fbc8ebbc7e3b867b9eb4
SHA18ce731a59ebc11b648dae90acf1108681e219aad
SHA256dfcbf06f5bf1fd685d9e7a0c5014e27f520da19e90c6fc4615b3145777b073c7
SHA5121a1539d20e1987286b8136adb9fc907104a23848bcf53a75a0c2313169feb345eb24428b024a254cc83316037856cfd75026b9b9fef6e389742b77627100e15c
-
Filesize
1KB
MD59450a329cfe36d1fdc8209116b58337d
SHA174a5eb404ceca36a8098ad948425b54bdbdd9d2c
SHA25673cafb9fc03bba9ef28dfc6691000aef10191fdd8bf29aa8a650cf71bd7417c4
SHA5123088d57845d48c4671d26381f6d1eaeb667ec44b1d531e472d8cc38adb87a27a00fcf14e514e937cd40b54fa612acd7b1e8c2a571e9402d8509edb4449a58ece
-
Filesize
600B
MD5c7569081cdc365697654e0bc726da742
SHA1268085cb3476b83225f6d84531c7aed3c5482759
SHA256a22a6e494e88caeba7781e469f4304eeec3f29af23c4dd172103da1a2a8262a1
SHA5125f33826dddb0c540ea8a00f8c07b695150acb56e6acc64e0cd54a9a9630fb026249b031cefda8b481be016c6a6906c8ec5e1e8cd1654d22d77177ccc203d0826