Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 22:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe
-
Size
171KB
-
MD5
502c929aa329a43618e5487d4d3254ff
-
SHA1
0b0de715af30242478d9e295151c674a9d508bbe
-
SHA256
0c254a5df3a474d7ff36de9220565bd3605dc4e4d9dd179926aebc52aab238ef
-
SHA512
dfbe68bbcb69931c5f8a0edddd3078cfd751f3bf53e3983f7d9b0fbca0b453db7c992daba0e115bd6830378b6e241b56f7e047fcdf6b38979a2724f42b55a732
-
SSDEEP
3072:pgRhPXq8b/aW2S7AxN9jt2qidhoFgug7S57a5XeOl8Zjx6lyf1chWj23U:pf8b/aFS7e9jtydhoFgug755XFuZV6ll
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2768-9-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2252-20-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2252-84-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2100-87-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2252-190-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2252-1-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2768-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2768-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2252-20-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2252-84-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2100-86-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2100-87-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2252-190-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2768 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 30 PID 2252 wrote to memory of 2768 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 30 PID 2252 wrote to memory of 2768 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 30 PID 2252 wrote to memory of 2768 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 30 PID 2252 wrote to memory of 2100 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 32 PID 2252 wrote to memory of 2100 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 32 PID 2252 wrote to memory of 2100 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 32 PID 2252 wrote to memory of 2100 2252 JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_502c929aa329a43618e5487d4d3254ff.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD55cbb1db1e7cb0686a2d36dd7a91c1514
SHA1414576a66f766d7b23b9962261ee52e4f38846fe
SHA256fce30b4b36bb3219eb08e67751fc71e23ed3f3bec12adde1b0cfbcc82c38d17e
SHA512da524ea2f9b8c78f3f218b76606957c7d78c1dad56dd9ebb7d38b47586938b948938317d5ea611109ba7a75f9ec56ba92e0d76b97a6e9ddef3b3a4f3cd6dc7f7
-
Filesize
1KB
MD5d8f9479e0865ec1fa986d4230785f44b
SHA16a29974031ec5ee8320a407ae90ff2b1a945f44d
SHA2561df4fb4a06c24f8ea2d805da2d432b073afcd1b5641ef5fad8dcf201c6625585
SHA512349567c25d1414e0d4769538dacb830e55033f9d8f3f04a5015558caf8dbf5bb5afc0835d6890f54d31789207616049478d32a66d9309c4c68372d9d958e2e6d
-
Filesize
897B
MD57dc615a3508e7ee7b1d7bd7507897ab7
SHA112e6a22629d9ba2033772395b152c14adc81a66f
SHA2569b2c1d8efd178c51b702772ae7667bfcabb3711d18cfdf1c865e4ce1df42f7f8
SHA512a3c219ced3d686de41692801e6fefb273186fb17d4500e4338fa3da8721555538d4b585cdcfb32ca43ec0f0f39e73febdf3f386b570c609c12253bf8ee362f8f
-
Filesize
1KB
MD591089ba7beafd91dbac21cd00f693b6b
SHA14a15e79041739110230821bc5abb516b4614ab05
SHA256a33ee8453455d9abb45860f51f34bb61de58043dfa435c0b0a4a708d13e66b06
SHA512b0f73c75b487b67e33cc5442d6af94aa36126714ab972d907467c1c960af71ad97802d1329babaeea35f638c91a0f90532acce47d2c92d4a3caf131b8a4d74f4