Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 22:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe
-
Size
172KB
-
MD5
6e7cc9d832b8e4dda93784898e96191d
-
SHA1
a8b3bd573fb29e13bfeb6988a322a520591874d0
-
SHA256
dd5a4fdea9fa94e6535803867990352151b51f3d9716be66be8282382e4bb3c9
-
SHA512
4ef75f30770e3c4078b61ffbce0f4032654352155cc9f96a20f5d587a004a17899628bc9ee30a649b0dd1753025b7a72ff378aa1515cc9d5c92a7080f731b0ac
-
SSDEEP
3072:VOVje/W2l0W1JZMwspmwwvjRaoq+0z0iIdCMCuqm0cAWoXAaGTVZQDghQqsZitRx:VOVjeO21Jitmxq50/djFpoQaGLtsZitb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2712-14-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2700-15-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2700-80-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2176-84-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2700-187-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\92384\\7ED3A.exe" JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2700-2-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2712-12-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2712-14-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2700-15-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2700-80-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2176-83-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2176-84-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2700-187-0x0000000000400000-0x000000000048D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2712 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 30 PID 2700 wrote to memory of 2712 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 30 PID 2700 wrote to memory of 2712 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 30 PID 2700 wrote to memory of 2712 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 30 PID 2700 wrote to memory of 2176 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 32 PID 2700 wrote to memory of 2176 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 32 PID 2700 wrote to memory of 2176 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 32 PID 2700 wrote to memory of 2176 2700 JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe startC:\Program Files (x86)\Internet Explorer\3A09\54D.exe%C:\Program Files (x86)\Internet Explorer\3A092⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe startC:\Program Files (x86)\84B13\lvvm.exe%C:\Program Files (x86)\84B132⤵
- System Location Discovery: System Language Discovery
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d21d7514e001d4d61c7c4680cedc7d11
SHA197a7cdfc37796560e9ace186a28e023287e1e79c
SHA2565b8fc4dd58ee15f2d5291215f8cbc230ca12c431cfb6d4b4ffafccda30fe6d9b
SHA512a2da625fd08226f12c75d8dbc235212357b233be41690c201d1ba2f3e9c54d0bb87213ebe56f546c58bc2256c23827a3b116e3e2cbe8264b677d62a1f375f01b
-
Filesize
600B
MD58bf2a150e1cae666c721130caad40415
SHA16ae08d90c5d4091a1d793add0c8121429804a6b5
SHA2569da2c895c291a25738a584df228629fe48210709ba9d2dd6b9aff8e891d66ad3
SHA51230e860f446c08f091d072306da8d5574cc0d9bc1f4ea2b749b83f1c4e9e5472a2214b85dcfb0981a20e8a2a8fff5903c37abaf9f60876b7d943e161e5519662c
-
Filesize
996B
MD503075797d017aa77c48af5eebbe44a45
SHA1da8ff294b7781b394bfbba3480054d31945a1a7c
SHA256412354a7dbb99d9537d83821e921965d42291ab15714911b2635483c1324998b
SHA512e6814bf97697f6343cf6408dea76674c5f67e5b4e995df5d88a62d9ff0b95d8a34182834aa3fb2262554327fbe3f7122bfe55556903b3d9cd130784c37f1a5c8