Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 14:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe
-
Size
160KB
-
MD5
583263a359b914b176d69a88b3646dbf
-
SHA1
d89e452870806ce5b381c0383bcc21fdca21f2b3
-
SHA256
615c81c523e0d149c6028933b738ce73cac4635c89c628abf5bb3dd9ea7b0acd
-
SHA512
d89e6dad243b0d6be37f98405070ac67283ce517a6f9d9e47697fbbf8a63cd24d38671baa26ce8b9f91419775f1697f64e9648b522da4571f3af3c0720fbc354
-
SSDEEP
3072:XZos/wh/aG0cV/2EfaSV6UjZkbPhcslzQKzH7lre:ms/wh/ayVBJVGF5QKv
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2876-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2904-18-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2904-19-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2312-140-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2904-141-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2904-283-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\2E810\\62FB8.exe" JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2904-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2876-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2876-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2904-18-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2904-19-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2312-138-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2312-140-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2904-141-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2904-283-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2876 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 30 PID 2904 wrote to memory of 2876 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 30 PID 2904 wrote to memory of 2876 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 30 PID 2904 wrote to memory of 2876 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 30 PID 2904 wrote to memory of 2312 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 32 PID 2904 wrote to memory of 2312 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 32 PID 2904 wrote to memory of 2312 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 32 PID 2904 wrote to memory of 2312 2904 JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_583263a359b914b176d69a88b3646dbf.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe startC:\Program Files (x86)\LP\B8A2\2F2.exe%C:\Program Files (x86)\LP\B8A22⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_583263a359b914b176d69a88b3646dbf.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_583263a359b914b176d69a88b3646dbf.exe startC:\Program Files (x86)\10CA2\lvvm.exe%C:\Program Files (x86)\10CA22⤵PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD599b5bcdbcb650c22ea7ee69756e60f03
SHA17a76162989ffe3149fdfc6238f8a03aaf2d7e963
SHA256ba49bbaa070055487251b695ea8218ba8f5a14da687df072dff6b4490bdac08d
SHA512f07c45d6e9e26d2a575649d30ef3d7fb709527027234f158676ddea66e697e3c2c34ba2f48a9f02372f9412db13a7ff0d0a818718a6e71e4da64cd063bde79d1
-
Filesize
600B
MD5fdeb3c11c07114f386d063362a0530c5
SHA1b5693205322a77365f55cb331e7bde18df1148ba
SHA2564c8278ea98c368ec41df58e6a27b181bce887c2dc501e432ffef42be54ee2226
SHA51229fc910b095a53dbe3f76532f44082061697b54288b7b6ab895ec8da3885219d9842a67b739970aca000c536b7df58f8557836bb7455d44c10bb41e6b845aed3
-
Filesize
1KB
MD553b1315a0e7ec871711ffa5670f8d99e
SHA10f9ad1f369306b6b3398aeba8fff94f34f61e5bf
SHA256b64f51f41a5ca5a0c3d16c17d722301ca76312cc9a439907348f9d6fb90c5c6f
SHA512633846734d72909bbf442950f7b18e0ab65ecfdbda83bd9e2fe40d46cb71f216440ddab60d8d1bb7c2d36b524300549ac1aa7c70db7bb9da9b144de0469de7ca