Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 13:00

General

  • Target

    cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    cd1f60e33e97cfd8666442bbb73d61d6

  • SHA1

    ef28dc487c4664fd5cc71bbbba2bd2d2af3ec991

  • SHA256

    ca64ef74f5424656bc57a9131651785a69001634d0af0b1280c9101be48fcae5

  • SHA512

    74ee00cf1026061c9bd9d1e8f6c21f6ceb626a80efcb73773b004376a8ffa3571e3dbed77c6af2f430ff8ffbcf084438a2cdabb4fd1465d8ac3fca0dcd38cc66

  • SSDEEP

    3072:ZCo+5CqpKED6/yn+fz4d1urm7t0Mzkwt5ySg3hnPUJMEFwsrwQ3nqIKqKzEc2XP:Za3pX/+fzYEr2t3zkwtgJxIz9r3nqIKh

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:2212
      • C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\cd1f60e33e97cfd8666442bbb73d61d6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:3956

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\2B29.922

        Filesize

        600B

        MD5

        5f05005f503a5fc1ab0fa68ccdf53d17

        SHA1

        17d23c8dd31138ff82872139c403da5023a43521

        SHA256

        6d308b37377e51ec63a798ac17f487fae3168f5ae93e421d20ec90a0131dee86

        SHA512

        628d5032d9ce2fd5532e0d8adc354d0a93cbfcde56b5bedf26365699a775a85accfc1d46200fe299814992490cd332f5b4fd39bc2032ab814faa0b91fcd5cc6d

      • C:\Users\Admin\AppData\Roaming\2B29.922

        Filesize

        1KB

        MD5

        972f6ee256c94dfdf73137c8e8564b5e

        SHA1

        c613b08594421d36dc6e859f3318801b53cc1211

        SHA256

        fc35e7c2b1ae316b94fcb6bdcfff8a9add7474f8d5a1a1287ab55d191901c35f

        SHA512

        95ce3f45dbeb08c4fc9acf95ae9b058f5136880bacb812053a1027f409c7de311cd2c8cc0c2d0fdf1860cf5f818856f53199e0dbb6e2c0ff5b7ecedb1e176b08

      • C:\Users\Admin\AppData\Roaming\2B29.922

        Filesize

        996B

        MD5

        b54626bfad6289a700c51809603af80d

        SHA1

        ee2cbbb0424f45ea6e5fd831dec760ea798f23b5

        SHA256

        09f9860e64c9161096076f3b2052c0b82b6fdebef18f17bfee577addb9f32ec4

        SHA512

        453df8a3108dab207603f21c1aaf76a7c90c1815c369a32bee5e528991846e2ebc4b3a57aa374ea9034972df5fff1bfa9d91d6bc4c64baab14d9084b6cfab6df

      • memory/2212-8-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2212-9-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/3956-91-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/4376-1-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/4376-2-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/4376-14-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/4376-88-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/4376-190-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB