General
-
Target
JaffaCakes118_97fe6db4a3c910d9d72b42a67cb134cb
-
Size
484KB
-
Sample
250329-y7hjxssyat
-
MD5
97fe6db4a3c910d9d72b42a67cb134cb
-
SHA1
34f7776cade03b11cbdcc05f10e78b427a390c76
-
SHA256
5428b0d1a7635a415eba28ee76fb577b2d0caa6d2c36d2308e0b2372872015dc
-
SHA512
39036a7fe8f50220dcd7ea97e2b6a6235e2425523d942f4c49d9dc9f4193c4a2402e003483fc91d9901c6ddbe3628aaeffe8799be64a5694919558f413e01428
-
SSDEEP
12288:UP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:UPoBHch+uudKNffiv1aVSaPTeO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_97fe6db4a3c910d9d72b42a67cb134cb.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_97fe6db4a3c910d9d72b42a67cb134cb.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_97fe6db4a3c910d9d72b42a67cb134cb
-
Size
484KB
-
MD5
97fe6db4a3c910d9d72b42a67cb134cb
-
SHA1
34f7776cade03b11cbdcc05f10e78b427a390c76
-
SHA256
5428b0d1a7635a415eba28ee76fb577b2d0caa6d2c36d2308e0b2372872015dc
-
SHA512
39036a7fe8f50220dcd7ea97e2b6a6235e2425523d942f4c49d9dc9f4193c4a2402e003483fc91d9901c6ddbe3628aaeffe8799be64a5694919558f413e01428
-
SSDEEP
12288:UP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:UPoBHch+uudKNffiv1aVSaPTeO
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2