Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 06:39

General

  • Target

    99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe

  • Size

    177KB

  • MD5

    99d397aac5d403a4f8ca0e94a5a4793d

  • SHA1

    92aed3a5e1b011a3688de504f24f5703754aaa8a

  • SHA256

    b8b6f794646b7839e2e65a6b241fdd02a63373be3706672ed5684cf594611f7f

  • SHA512

    2dcb6b18a050c2fbb127300e42ba504c68cf9ce3394abae6d55c5176ccfde42565e38c6d02bdff6022ec72afa42809ca182cdcd87ef03e4f802fbb8c23f077e9

  • SSDEEP

    3072:VHGuZBKl0neRybgnEF21PbSLtmdQ3IeyWHfFpaz5BeqSSLjig6kiEoD/t9v:V7ZcynBB21omdMHHzYJxjig6kid9v

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2520
    • C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\99d397aac5d403a4f8ca0e94a5a4793d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\E192.C0A

    Filesize

    1KB

    MD5

    d0f5a9e0d5af86ff78a3d34386b5cc77

    SHA1

    bbc9ff154b241eddbea69d2889bcd00efdb1495e

    SHA256

    1ea7ca9f6f863cead75ed04dd03a8b006f3f3d4c8f2d772c03d0ddb1efafda9f

    SHA512

    18ca6c1f00d62c5074a388d263d78ae4602d235c39c3501c2474ad4c5f53a6dec3440f300906f02f6a191acfcdcafff5261802dbf39a4308e1dcc15f03e43b8e

  • C:\Users\Admin\AppData\Roaming\E192.C0A

    Filesize

    600B

    MD5

    3b8de13ac1a4d0e00d8233b026c6ad83

    SHA1

    dbd9942df5dc4de5404934bc1216b50c4cff0306

    SHA256

    9d8bd526194ab2e993ae73337fba4fb89e4c7e486126c7a5bf4c1b7513d14ffa

    SHA512

    d37e16ead4b5946b3dc7c017169aabd764d66301fa47770e8a58cabcb09cf39a6f083800e675fc5a87d00670a6948e8e0f4566f490b71c33a9bddf6badec54b0

  • C:\Users\Admin\AppData\Roaming\E192.C0A

    Filesize

    996B

    MD5

    51b4264d52dcbd79e19f609b67741637

    SHA1

    d4d5ec41ec085bdde993a4a0e642a6ede49fd132

    SHA256

    a775b85ccdf7377d2bff9a686fa57079872cb3d7da8b0e52d9c423ee187f9aaf

    SHA512

    9e142908c3116b5661278c2ee09d35526699886cbb19317becbdf18114d93c5aaa6c095f75d1bd9e4e3248449d267b6079fa81b4d71a8beab16f9b52d34b17cf

  • memory/2500-1-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2500-2-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2500-16-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2500-198-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2520-12-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2520-15-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2520-13-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2652-85-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2652-84-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB