Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 04:40

General

  • Target

    cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe

  • Size

    171KB

  • MD5

    cb175fcf43bb0f07227ed60c03b7d4da

  • SHA1

    ba04ded2d6f0651eff238736779830fca66adaae

  • SHA256

    2b31e369ba3cdbd27e6b3ef96df97c1806bf9706f314b8eacdc8d0c3367aa480

  • SHA512

    b3571444035b30e55b18c86d9e0cda0f68566ab60e174302e32f6c177b5f4347ae3e0f024af58c8a26d43e797bfe6e525e6d7b12831063ca51ecebf3be85382b

  • SSDEEP

    3072:4cDdvnrlP7DZKO3p8tZT8uex1P0ofhTe8lcGcGKvHfYm0Yp8X/ZcD/Cs:4cDvP7kUaZe/0oUGcbfwdfXmD/R

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2648
    • C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\cb175fcf43bb0f07227ed60c03b7d4da_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\E5A6.BE5

    Filesize

    600B

    MD5

    112d270aaee09aa17008450e2f706691

    SHA1

    27beba58b4c48c5e1781b05ba98190cd6a232b50

    SHA256

    0b7c66ce29ce9e65c073997c09b8c68289915cc2ffa3e434700828797607513b

    SHA512

    2cd25e9bf1663a2bee65806ae1f7d5337c3b2ac361cb920cdd9a4318c2b15f4ae1e05b2275fca0ec828d1c351c212de099b5046b3641b7f1866ff119c1166e60

  • C:\Users\Admin\AppData\Roaming\E5A6.BE5

    Filesize

    1KB

    MD5

    3e2890de24896624168c5a077d0ff51a

    SHA1

    cb0da370cb61ac62666864afce71b4d8fade44fc

    SHA256

    654c69a3228839dcca5875c556aa437f6912bd9b105d5b2d559ad09a829caa06

    SHA512

    a06990175467525a1611371ac6f78e7da834a7361c7f2271055bc93b182a61dc2de497950b916d19204e5e7201ef9073c55e858c252a28c3c3dead2f50284287

  • C:\Users\Admin\AppData\Roaming\E5A6.BE5

    Filesize

    996B

    MD5

    f06c23776f9eb3c74ca3f5c47355d0ef

    SHA1

    f33491ca95b04fa4c5c822a853930babd9d28b1c

    SHA256

    97c4b87557d9004aef7106158944e07e0d86e289c5a0dcb497f9c5a032d2c3a3

    SHA512

    3df029c5377a34ad7a52b52b258a21cf379b7f7c101b4716aa9f28ff93685b0a7adf58d9d5d8087d89fc3443825cf4592c26a066bef672c806992f4341b3157d

  • memory/1108-82-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1108-84-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2648-12-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3044-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3044-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3044-13-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3044-80-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3044-200-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB