Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 18:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe
-
Size
165KB
-
MD5
59ef85b79a6382700ebdc1bbbf8f01c1
-
SHA1
1eb32ce8991b1067930ed13d7d9a8ebdb4ecc357
-
SHA256
a2b0e82c6cc7f9c66f119f32b2fd402a68f0bfbdf34129709078fbae10cd14a2
-
SHA512
32fcf67d50ca1beb4eb49939dd3c623226448996e33fd02b691cd720b40593dc24ecb6d4c8195752db22c91420e0f8fa74736fe670f50aad2bb167599c413d9e
-
SSDEEP
3072:5FlKQvSVSSSR6m1iNm9Euf2Vw+B0sSUvsvcBqamZDOwaDJmC:xq7S2aEuiRsvcbr
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/356-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2588-19-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/2588-20-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2564-134-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2564-133-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2588-135-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2588-325-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\5DEBE\\9217E.exe" JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe -
resource yara_rule behavioral2/memory/2588-4-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/356-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/356-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2588-19-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2588-20-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2564-134-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2564-133-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2588-135-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2588-325-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2588 wrote to memory of 356 2588 JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe 82 PID 2588 wrote to memory of 356 2588 JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe 82 PID 2588 wrote to memory of 356 2588 JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe 82 PID 2588 wrote to memory of 2564 2588 JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe 87 PID 2588 wrote to memory of 2564 2588 JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe 87 PID 2588 wrote to memory of 2564 2588 JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe startC:\Program Files (x86)\LP\7E05\CA3.exe%C:\Program Files (x86)\LP\7E052⤵
- System Location Discovery: System Language Discovery
PID:356
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59ef85b79a6382700ebdc1bbbf8f01c1.exe startC:\Program Files (x86)\BE1C5\lvvm.exe%C:\Program Files (x86)\BE1C52⤵
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5a04aad9614210f3af7ca448c55574d38
SHA1f9f68e413a3b5fce31db0333f402ebc5330a269c
SHA2565d5c4ae777a18fbdb4e174028653072e4f3e9826fba78cdcf9131cca4d174eda
SHA512d89ebaa7a1055419c006bb8e5f91dd772cd5bb54d98d1466af01c7bf32e6b0e7f6e228ff89e84f42264b63ea7c6a5cc4b594ae21709e4c7d4ffad2399074f41e
-
Filesize
996B
MD57eeb1186d6f7b8cb17b93e51e5cbbae5
SHA124ce40e30941670621615779fdbff7b09cff2fc1
SHA256f927f7fe2b9221b8eee52ca39d36a16b8898621efcce35ec479dc566404fa12f
SHA512545b99d444c905fd1ab60ec0260303e2d4de5ed8fb5c791ac40e48e1a1b075ede68fb2161c5ef0e7af293a62a0e8b06932cf60a02febb574fd30eeabf291cabe
-
Filesize
1KB
MD5bed7bad567e45b79f6cae237675466b8
SHA1e643f8e93ad4c924f7395d16923f4cf759fb02a4
SHA2569124e4c7503baa07710612128ed220f1eeded9bc2e59d0011688b203cd92ff6a
SHA512fc1891c9c358990c057b925e898a7fd5d5ff880f9999acc77f44d849a6c1bffaea06191c304f012d865c707fb1c831ff6343f32b978c4fa2ad4c071713a3623f