Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 19:53

General

  • Target

    9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe

  • Size

    169KB

  • MD5

    9d92fe3acbdc5b305c88dbfbc35fa860

  • SHA1

    74c8ff6afe4cdbc427c3c7120ebd4126f56bd5ac

  • SHA256

    b2942a6f0c86649e5e35ac6a5e1748c953a87c7c27e98d3d6707f22125bba19d

  • SHA512

    786116db37f708f23e8d7ff639d270e98a8f91795450f7cae3b61bdfba13c84e9ed20c3b909b165c3dd641854fcb08a431a889c65087d21c1732b75bd9ad3d0f

  • SSDEEP

    3072:eZckfPFOLpIk182brq4vAvG2X7j3bgSr7DHpKWxZ7PUz:4cuFUIk182Cd+o7jrgM7LpKWfQ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe startC:\Program Files (x86)\LP\D4F5\F72.exe%C:\Program Files (x86)\LP\D4F5
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9d92fe3acbdc5b305c88dbfbc35fa860_JaffaCakes118.exe startC:\Program Files (x86)\8CA61\lvvm.exe%C:\Program Files (x86)\8CA61
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\5278C\CA61.278

    Filesize

    1KB

    MD5

    f940e44677ec6f3b549b8506e2b69ea8

    SHA1

    3cb48eb3e6f066dfc08f49d66ac150d52c4b14be

    SHA256

    8cff114801e26fe0145c7ad6cd3e9c0a8baecac40d250e02d1af5750d2b178af

    SHA512

    902c9108a9288ccbf1dafebc129100168ab45a64c44acd8f95e6b2b8ae5ad4d315a26d1f49382ac63c11acedca36069d7a619d4fff37153167d674adb281c991

  • C:\Users\Admin\AppData\Roaming\5278C\CA61.278

    Filesize

    600B

    MD5

    e8081fbe641d04bdb3261aee5a98a482

    SHA1

    f0ae84965919127f77bfb2a9f2c931a2edb07232

    SHA256

    aff062eb4534627d5287756c53c7413f1891c3a8fa8043c1b910b6f09d21d565

    SHA512

    915fd65b85652b2a23458ab9fb62891f97519debff0259f1bb5b3424dcfbf1a5b23452722f60700a6761b7d62da3b9d699aba4cee4fac42a0bb6161cde923ceb

  • C:\Users\Admin\AppData\Roaming\5278C\CA61.278

    Filesize

    996B

    MD5

    af2602b9e82914130c4c9892d6fe6d30

    SHA1

    7a7c0ed1ccdbe97a68d9d93521c0ef7542a1c1b1

    SHA256

    457d0bd83417b73a0f9e1cf21656642771ac507217467a3ce7d0d642d1f49a30

    SHA512

    5eb1cc271bb6e8ac658187ec0a5452c6d57cb0748e9eade6cf822625bcbf3f4402a47a42119192fb1ec8fb6476bc9766caba992b632c513ae5fe29c64bd433c4

  • memory/1964-79-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1964-16-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1964-17-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/1964-1-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/1964-2-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1964-185-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2680-15-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2680-12-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2680-13-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2892-78-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB