Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 13:00

General

  • Target

    cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    cd1f60e33e97cfd8666442bbb73d61d6

  • SHA1

    ef28dc487c4664fd5cc71bbbba2bd2d2af3ec991

  • SHA256

    ca64ef74f5424656bc57a9131651785a69001634d0af0b1280c9101be48fcae5

  • SHA512

    74ee00cf1026061c9bd9d1e8f6c21f6ceb626a80efcb73773b004376a8ffa3571e3dbed77c6af2f430ff8ffbcf084438a2cdabb4fd1465d8ac3fca0dcd38cc66

  • SSDEEP

    3072:ZCo+5CqpKED6/yn+fz4d1urm7t0Mzkwt5ySg3hnPUJMEFwsrwQ3nqIKqKzEc2XP:Za3pX/+fzYEr2t3zkwtgJxIz9r3nqIKh

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:2360
      • C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:1696

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\7317.FE7

        Filesize

        1KB

        MD5

        58eaa2b1e0c503c835794371e2d58d73

        SHA1

        3957cc6f10ccd2ede8743ffe1aefa3f2b19a0f64

        SHA256

        355206843dd8adc3df04544102fd7526b92f81e64cb4c695ed1d633b33d5fc58

        SHA512

        df3595aedbfd619a649b3b3b221237b5dca171726b395a25d4d4ea8342c4511ff575958adb9856a021fe52081b3b77a4f2813092817e61de8e0c4323b9b23804

      • C:\Users\Admin\AppData\Roaming\7317.FE7

        Filesize

        600B

        MD5

        ceeddbf628aade0f81926ac08164d471

        SHA1

        bf06907d9b1aee6fffee4848297a41de3f4514c6

        SHA256

        105a67a2ab5bae7dd86b9a533fbde6a004b0df9b1d3b5dfeb5d602c2948067c2

        SHA512

        2319bf8366397d3c1cacb420ea4eb8a857c36d1d987feb72a51d98ea1b14eaa51ea438f9d9f87cd33ba834aa78ff9423cce3e796b14b8ea22f69565a47951387

      • C:\Users\Admin\AppData\Roaming\7317.FE7

        Filesize

        996B

        MD5

        2e8e1be1ade811e7eea6ea9448e306c1

        SHA1

        79803f1d2004cb22ebe412999a7b97130c20711c

        SHA256

        4383cc422e48b90f793514891224aa7bb390c0fc1bba83f0a7523af7de565355

        SHA512

        599f234a32f81b25bf1126f9a1277c9813148abf52d4e23b757ad451e56de6d522f63f049615bbc48d9d6b9f1c22cf66bb2002904522fdd58482b0762bf76936

      • memory/1696-81-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/1696-83-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2360-16-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2360-9-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2360-10-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2568-15-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2568-79-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2568-1-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2568-2-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2568-198-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB