Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 02:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe
-
Size
167KB
-
MD5
5dc07529222fbbaa09b22ca5686992d9
-
SHA1
55f444cc846d3dec13606b5efd75684127388e52
-
SHA256
3e00a59f3c489f8f0030f312edec6c7324158227b55c0ab23a37d3515e6eb861
-
SHA512
5fb6f6497c06fa45f17cf4dcff392d0986798b721a86c298668b32aceebe3eccbb09f3da83a038eeaae38862ed4605d1d56ff62d38890139aee1c14f7d2e1f9e
-
SSDEEP
3072:WT3agtQ2WNRHFggFgpRvTGQXb85vjX95URu1lWtvfdAZlQXuW0H:WrWPRSp9XbCjX95URLvlAZlQXuW
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2088-14-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2088-13-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2900-15-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2900-16-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2900-77-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2956-81-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral1/memory/2900-178-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\EFC63\\D97D0.exe" JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2900-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2088-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2088-14-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2088-13-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2900-15-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2900-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2900-77-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2956-80-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2956-81-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2900-178-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2088 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 28 PID 2900 wrote to memory of 2088 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 28 PID 2900 wrote to memory of 2088 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 28 PID 2900 wrote to memory of 2088 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 28 PID 2900 wrote to memory of 2956 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 30 PID 2900 wrote to memory of 2956 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 30 PID 2900 wrote to memory of 2956 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 30 PID 2900 wrote to memory of 2956 2900 JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe startC:\Program Files (x86)\LP\D05E\18D.exe%C:\Program Files (x86)\LP\D05E2⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc07529222fbbaa09b22ca5686992d9.exe startC:\Program Files (x86)\63023\lvvm.exe%C:\Program Files (x86)\630232⤵
- System Location Discovery: System Language Discovery
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2bfc41a4849df0ce09730e23e0524e6
SHA1b5cceee5b9ce9b31a967070793ac0a4e9517d11a
SHA25619d6008e70524e7e743321858528ab98df17d1bd0b0110aea115166fd05dc507
SHA512d00c3dbf7feedfe8fb3ff1ba346a4bfcdd2c2ad506e922a96939d0e2429e71284b2a4cd9034894bea6908b44d97861b202a9605afd924514f0e8dcc43a39d6e9
-
Filesize
600B
MD5db5e9e3f8136812e1c96de61a5da7416
SHA13af590d3d1005406996d7f2f8264ceb24f1642bc
SHA2569b170e172dffeb9232ac27a8a889700259ca1a2ba23eb63afde1aa3e18dbf9a7
SHA512e5d29c79133f28b3ae677a9a0484f20b8f687dc5514505342460f3143d55397d540dfeb2be9fd1f7f5f9a3891be83fb843e001b33fd9ce2a1a8dbc62f0b75145
-
Filesize
996B
MD5e7f70a370794a6285d77c30dc199aa9b
SHA148459ce556b277fdd16934245e86c20bb5d4f40f
SHA256717c4c93da189b92e55da056d246bcef68c006e50f3a14c323c7d5e303f4f24e
SHA512d66f792c9f579d8d5e03a2941ef4f52d41bb731bf1dcfd484893b6c564df4a8038c639d9377dd3131b4b6ab5742bf94e7a7ceaf927f461bbf419663077134e57