Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 15:07

General

  • Target

    9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe

  • Size

    180KB

  • MD5

    9576ced894b1306bb46ea64e5e3cc1b3

  • SHA1

    b0aedd64fd52a19d80df3381df1d3a2ff0fef3e9

  • SHA256

    bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304

  • SHA512

    a9caa0e61e5c356ef79bff9223e1db1a0a6d40690d7b59a601230c0aa2434bba90dbb7035d9e0d90ba9339e6ab79826d40f5c576c77288252119b6f40936c275

  • SSDEEP

    3072:KEVm8FDMBRQW578SzOKdImBUdkDnnzUn0e4TZAQEjaPHEG4hJo5kLctnYZst6AZe:1NJMrdJ5dImBKckD4TKaPE3C5kLctnYn

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Program Files (x86)\LP\1DBA\A42.exe%C:\Program Files (x86)\LP\1DBA
      2⤵
        PID:2812
      • C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\A11D4\1F41D.exe%C:\Users\Admin\AppData\Roaming\A11D4
        2⤵
          PID:1948

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\A11D4\4009.11D

        Filesize

        996B

        MD5

        070609139c94851de25e76093e59b98e

        SHA1

        1c58f3b7f45f82bbce2ca08964f98cd9f4fa9900

        SHA256

        45eab3ac7f25dda9aeb911c3b2c1ed50d6ac9019cc0401735eb0a1dab7fb41c4

        SHA512

        0db1a7a5667f7ca009bd46f52432d7393fc258135d5cadd44fc9b0d0f572deef8409dd0830ffd461b2d83b3e8c3d6b8567532fc53d1c337e0de0b3c1f96c03c4

      • C:\Users\Admin\AppData\Roaming\A11D4\4009.11D

        Filesize

        600B

        MD5

        764c11d9d4eed091633693307206b17f

        SHA1

        a33bc7ec967d3732b699a6dadbf9c4b8b937ea5b

        SHA256

        fa3d19d213ef4268789a62ba6c46168e9e82ce7c262c99dd25b7af662d22a9ca

        SHA512

        31ebc59b7e55393615519fd96a54d156762ad2df90e13012d8e3d01e0c703fd5dfea83833a9e7b158915a2efbaab3534364e981bf247bc2e818046e94bfe41e0

      • C:\Users\Admin\AppData\Roaming\A11D4\4009.11D

        Filesize

        1KB

        MD5

        ec1d156630444c1a6e5c0fb431a2fb0c

        SHA1

        759887064b6057993911c8b7999ae2e981621ff2

        SHA256

        af08e738084900c335bba50a595652983f750b3ead87e270767d4d22b2e6ed85

        SHA512

        3b1f205af74a22f79a62e3e2ea131471345880d9c022e29e082b4d6dbb96f77150b13004565ed3f5f29ef4eeb03a408b0066931b64cbb2e65f0594818f578071

      • memory/1948-111-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1948-110-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2812-13-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2812-14-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3040-16-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/3040-15-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3040-0-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3040-3-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3040-2-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/3040-294-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3040-295-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB