Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 20:51

General

  • Target

    97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe

  • Size

    197KB

  • MD5

    97275bf43a8a0eff3b23bd18ab28288a

  • SHA1

    352a4168ef61b00b5f25d432ec3b109b0eb5d2e8

  • SHA256

    dc77c3681c771dfdf2bc5471537b068655429741891ccc6cde717c571adce276

  • SHA512

    71c2403b7c35279cff82d85d0ed8b8f9147a39d384fea21b88f899a75cd14e11d3dcae0c20a2bf89abd04cac1e400b1c53951e4476a3214632e44dc7d46ba61f

  • SSDEEP

    6144:zF9pAsRJFmLtO9dtbeF+8EIT6Af0qWBZYKoN/XbNc:zFrAsJktQdtbeF+JjM0J

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2772
    • C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\97275bf43a8a0eff3b23bd18ab28288a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\D508.025

    Filesize

    1KB

    MD5

    770b30e00e30bcafa4abb538738b0f3a

    SHA1

    8216d151547d22fa4283340addd37b928f9ad285

    SHA256

    82ca95c25faf1a4381674a5cfb66bc65f0d1baa395e7ac77a66ee0ec14096ae7

    SHA512

    7fa7ab4357fe56dfe7abf10213b81f88f3fdafb8c0780f2b8c22bfb9c793f23d9121000b6079f94b94a2d378b34828c5587b31e7b65f6e6a1d35a814bdd17dd0

  • C:\Users\Admin\AppData\Roaming\D508.025

    Filesize

    1KB

    MD5

    45bc8ea55d0a30347440e76d62a8ceb4

    SHA1

    add99b157151127cc822f56cad14cbf339c40f3b

    SHA256

    1d6e7df1c4417945f5d6504f2ab46f29b56fe0293eb01eb6fad351df4b42fbb4

    SHA512

    27669c1077b0f6277cf0dafce0b7dc07a4e9f1dae21a13dc5d35567100a782ca81c7436c731bb4a654a21736b2ae33ede9660ebe185c817d8134923c55579076

  • C:\Users\Admin\AppData\Roaming\D508.025

    Filesize

    600B

    MD5

    098dec8edb26e1e1af58c85bed6fc1f2

    SHA1

    8123a6d85bad213f43d6d6b43c3750a739f4ec7e

    SHA256

    3ba34bd84c798f73818e2b188b4af59ab1407c4a77a7ca3ac34c045e62f1b170

    SHA512

    9493aac27190764c6e56aa3e2a81d5113637d83acf455bdc7fade67c54c714eba1ea470d7cf86335ef84197886141281991210d2a13ecebe4adc640fcf9e0ddc

  • C:\Users\Admin\AppData\Roaming\D508.025

    Filesize

    996B

    MD5

    5c1af7e3e8e1f10f8da0f6fc35bf8261

    SHA1

    aac122a7dd0646db006eb67848147603e2e930cf

    SHA256

    aff759809c1af810687fbd6e4fb3e8fc5a0e300dd7abd1e037fc31acf737c9c1

    SHA512

    3dbd247f64c9d9f10da2e3e1796889cd17fb1e059e331b57bd8090f0638cca0ddbc30816fc6712c835ee2a67f0dbad555e742b1f90fb3fb36ec26e56e9f44d05

  • memory/2140-2-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2140-188-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2140-16-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2140-1-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2140-80-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2188-78-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2188-79-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2772-7-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2772-6-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB