Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 05:50

General

  • Target

    9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe

  • Size

    169KB

  • MD5

    9997e42eeb6977b50e78bad12c90b587

  • SHA1

    9dc7b2b9414a74154985fbcfcc2ebf887c7ed959

  • SHA256

    b671331ac12768b61e3eff47445629fdab91a876884f999c3663a4ec40dad3fc

  • SHA512

    c3c69092cc3ce63d8bbfc7d272c9e0bebf65177447cc0860619f1d3843862838bfb74ca6ba20a15fc0e5e213ded980e0f3c354171e84ac7be84ab50f376e3b86

  • SSDEEP

    3072:urhKBvV3YgyGWb/0UkrYEnYOLhhjQ7ieoeIJiZM/bfYwGNR3ovttT+uxN:l93GGYEn9vQ7i2LZv3YvttF

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2068
    • C:\Users\Admin\AppData\Local\Temp\9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab48D5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4907.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\FE5A.52C

    Filesize

    1KB

    MD5

    789112573dda1fb7156b4966107b8c8e

    SHA1

    90a72df2f3e4e1b713021b301fe06e21920fd0e9

    SHA256

    5e4774f0fa887a202515db072c26f200680f64498a69cad02ba325073035b3d4

    SHA512

    bdba4683b30ac8e8f7f91e22c20b9f90ce20c3fda1fa83c9fc330bdabc730aa4369c14867278a1055f3b4805544e758bf08c41b64c0c91131d89bb1225467e0d

  • C:\Users\Admin\AppData\Roaming\FE5A.52C

    Filesize

    600B

    MD5

    1fbc76d61cf607af1ace7353b0a2e7ff

    SHA1

    80613dd29836884ff074f827edd4897a06137ec4

    SHA256

    645fb013d5140f5d208ec113b4d545989c3b5bd5706a9b29f97db056aa6c9056

    SHA512

    c1b722ee38bab9973ce0bb32f671d250cc1d5cacd708ade1a18259587ec00abdd1068588f6c4e03268cea79330cccbc249302fc841241de6309e7244a9ec72b5

  • C:\Users\Admin\AppData\Roaming\FE5A.52C

    Filesize

    996B

    MD5

    2d3424fcd69b9e4920a87cb96cfa30e9

    SHA1

    6ca814ebf80a62d2538f5de863f5c837b8415b22

    SHA256

    f71d3d2079b9e0ff928ab7cca7795b4ad738c91af3fb2c624f87895b4750234f

    SHA512

    c320a0ed5044bb0083f5958f7cf0d0744293c47101a73f8a1124f4d79303e827d7f016de4994ce2a683230c278c9f9b012acfda42e60ff3ecdbcf698b574de49

  • memory/1296-72-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1296-70-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2068-5-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2104-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2104-73-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2104-12-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2104-160-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2104-162-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2104-1-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB