Analysis

  • max time kernel
    140s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 01:44

General

  • Target

    9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe

  • Size

    182KB

  • MD5

    9f204ac520b43d2fc0dbee96e0c9e287

  • SHA1

    b86fd15f81860eee91943ec4f5eb65a2cb159ef2

  • SHA256

    ee7e8d3c67a034dbe7196d4f01e7ef9006d87ce1dbb577cdd9d148516012487e

  • SHA512

    472ae72c15a3418b26395e27b4a3e44c024578fc6f420242edca5486c78876f04561d87e399896dbcc11af67d67d8ae335381d15e70559299148c308b9761364

  • SSDEEP

    3072:H2Nu+u6t71AZkPRS9HNv0j7d5bmiolHJybr7vbXr87sLL3dwr6h3FDnHj9l8V5J:H2VWcRckOPlHJYr4sLyrC1D5eVfY0JF

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2272
    • C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9f204ac520b43d2fc0dbee96e0c9e287_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\0E00.DAF

    Filesize

    1KB

    MD5

    0fd21b2d1ee5d807505702039f9a7727

    SHA1

    3ca53bc51c8097540e73da9d3126257a13acb1d7

    SHA256

    e47ce23f0819e8f6c5026793b8466d16afac1991201f4f5e0af4c03c7cf0034f

    SHA512

    ba6b5d96279316dccc7a04a7507fb5d22e96dd135224f40fb56eca89955826957eba6075f00a9b625be8e6258a8eb8c76aa0fd3941d68960fc429fc09ba06ce9

  • C:\Users\Admin\AppData\Roaming\0E00.DAF

    Filesize

    600B

    MD5

    6050266dd238070a0d18a9d2c0ff4a77

    SHA1

    7f79772dd9f799543699c998a75fedc4ff8294bc

    SHA256

    17dc948dccb4f83fce9d72b3c776a6e256f8f92248c30a86f950b6454b322436

    SHA512

    fe025cdbf1e7cc3eccf13c493e41a749766d8f5497bf37ba3b047262b40160f57af0c6c89a29c41866b14867c99c3d1cb07cb9cb1c4ac57c5a126bacb2ab5a88

  • C:\Users\Admin\AppData\Roaming\0E00.DAF

    Filesize

    996B

    MD5

    d0bf6cca7a36c1e98077b25c0b5f6d6f

    SHA1

    1349becacc72e253b4e91219c1c93c4158a4116a

    SHA256

    db3897cc6d6030b605b6414c94d8dddd94ee28a74885e5e55bb2a74544d1b635

    SHA512

    fcb07b1cbaacdd3cb5625016ea6d395f0503b56a78b51338ab07a7853f595eb0d141d3d6691fe0747e46e1b41a2937758746769d206691045cba8858d218dd4f

  • memory/2108-83-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2108-2-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2108-189-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2108-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2108-15-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2272-12-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2272-14-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2272-13-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2412-82-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2412-81-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2412-80-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB