Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2025, 17:48
Static task
static1
General
-
Target
JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe
-
Size
174KB
-
MD5
a0d8a6d05e49d40dcde008467422135e
-
SHA1
fc8a6f42d9da69e1dde86568b4efef612b575f3e
-
SHA256
63937432ce8cbce3d93cf782d5d568b342b491a3a3a5c804ba17c59e66afdba9
-
SHA512
3a05a5e52ff5aff1730822d2ad6a5b3609f05d1233dbea519316c404fc07e0bb3ee03bffe3bf47fc1dfa9f955461d72a5ddd150bafadcdf703b06baa84dbf2a4
-
SSDEEP
3072:v1wKJ+803oJr5d/JWunRd1obDUkktXvIZ5P2i1:vm0+803oJtdht2bDUTt0T
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/3044-10-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1384-48-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1384-111-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/2452-115-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot behavioral1/memory/1384-195-0x0000000000400000-0x000000000048D000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe -
resource yara_rule behavioral1/memory/1384-2-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/3044-9-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/3044-10-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1384-48-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1384-111-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2452-113-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/2452-115-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1384-195-0x0000000000400000-0x000000000048D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3044 1384 JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe 86 PID 1384 wrote to memory of 3044 1384 JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe 86 PID 1384 wrote to memory of 3044 1384 JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe 86 PID 1384 wrote to memory of 2452 1384 JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe 98 PID 1384 wrote to memory of 2452 1384 JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe 98 PID 1384 wrote to memory of 2452 1384 JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2452
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5bd55c41a26469f99b1d7360dde69e646
SHA1161ae148b6662eef0d6fb80e6cf118ad86c7f684
SHA256eb51ac25400b2ae71a013c36fec2a32f03bc65ec5e9f4a40d58aeec11a50e1da
SHA512eb773be9ea052fff82d8928f9ffdec098731cb88c20d656c9583cc2664e7d8046dc30436867198f4a7a2f3db8ee9ed589b07c1cf59f4892a11cc1b9ba2574b05
-
Filesize
600B
MD5a88d38c0e85a7b05acc262d1600a5495
SHA1ad229c7c58da116b9f236ac839658f161ced56ed
SHA256aa11bd61cf06e45c9adb09ea0e17a28675e0adf7b90696f4a2a37103b37e676d
SHA51297ac90e2e12c90500466ce858ada6ed85fb25fc4c31ec74afe40910e0d50e2dd4e024fe234166c87d99bf136da64ca3e6e3b6c792e20a6036f3f7db8150dbcf9
-
Filesize
1KB
MD5fd77566b8fb69571035a5ca3dcebed92
SHA1a136a26ccb7bf836edcba426c465ea821c3951c2
SHA256d3816ced73717a2d0ee41d4bb987e9fba3ac3067e13c6643a4868f37e98243bd
SHA512a6b75cc7c7a8fa7b3746f2a973e4d974137169348e266d7bceba3cff8058d97281e805e1c68c74a46d1cde18fbdfb460495a260a0cce179c4119f634284bc5b7