Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 09:41

General

  • Target

    93dc02754068a3e580cee8d058a5dbaf_JaffaCakes118.exe

  • Size

    181KB

  • MD5

    93dc02754068a3e580cee8d058a5dbaf

  • SHA1

    8cfe4d654e8c80bc5662785ef26ddc5db67253c7

  • SHA256

    83c4ca883e96da4963e62ffa6a5d8a139f43999772c024dd6a42c059c668ad45

  • SHA512

    d98a86ebafaf7cc703c874d553367562cb1335b5521655643333b722fda21cccf7949e4b1bb682d7c3d41248db7b5fe7f17d3550715ee82facf1851afbe9914d

  • SSDEEP

    3072:6za/stqsLtNsNMSg5q6Wv7M/5zYQogkzV5KoNzSTqi4UfhYpeYWVnS8y9vn83vwU:9/kTIX/NwR7oRV5XNz0D4khNhG9vuw

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93dc02754068a3e580cee8d058a5dbaf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\93dc02754068a3e580cee8d058a5dbaf_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\93dc02754068a3e580cee8d058a5dbaf_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\93dc02754068a3e580cee8d058a5dbaf_JaffaCakes118.exe startC:\Program Files (x86)\LP\231A\933.exe%C:\Program Files (x86)\LP\231A
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2304
    • C:\Users\Admin\AppData\Local\Temp\93dc02754068a3e580cee8d058a5dbaf_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\93dc02754068a3e580cee8d058a5dbaf_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\A3FCF\E4023.exe%C:\Users\Admin\AppData\Roaming\A3FCF
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\A3FCF\F376.3FC

    Filesize

    1KB

    MD5

    cae05513190ef3348cec2965655e5368

    SHA1

    4c9dc4a79f495bf4dc270a17b5d918264509c27f

    SHA256

    d11f2c506864d2fdd6a43c204c31f1b01d5dbdb13934f54b70eeda82cc74b363

    SHA512

    e679f2094540bafe38f0081212bf134ada54696330db52200d0612e480bb3914a6490f7e3dc545101e5cb08488207883b47ef63674ab6ff38c0daf77dfd93503

  • C:\Users\Admin\AppData\Roaming\A3FCF\F376.3FC

    Filesize

    600B

    MD5

    5ed3cd691116a27cb51890be06af2028

    SHA1

    5dc1f3a1cf8c721a3d69a4fef1ab586efc70ce97

    SHA256

    a788e1a75a5946da09291097b5eaf2352b06262c92ce092e5b76a7a34d3d3a98

    SHA512

    90e3725caab0606bf65308d54568fdedee92db4df35ae6ab29f84877cf0d30bb1f757ff42f218a952046c2ffc1fe32dfba1cf5229b045fe637820275f4eafde2

  • C:\Users\Admin\AppData\Roaming\A3FCF\F376.3FC

    Filesize

    996B

    MD5

    fc8e6ff62a2b96488760bbac528aec4f

    SHA1

    d81fca67ab0e885e4cabac84f6f1d55dd09884f8

    SHA256

    fac91b59c8b9360833cea8828a90222df57a576a2d5568363a505c1876fab025

    SHA512

    0b2bdb9bbc88c8405a8b316301d61e04ff58b430e57600a3033752db7947d681469034ee915293a91ab2f6e94ddb5777973ca0d8f40ba9213c026d9794aa6770

  • memory/2232-2-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2232-175-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2232-1-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2232-14-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2232-15-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2304-12-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2304-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2304-11-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2564-78-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2564-76-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB