Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 08:22

General

  • Target

    d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    d61c9b8e17d0cc069c4b60999b812c81

  • SHA1

    4a47a01ea65f6a50ad68eaa3413bc8a5523d5dc7

  • SHA256

    b578123863060b0f17c6773b6deb5467c17e1b6c04f7ffc4e33f45a499030adf

  • SHA512

    797f7aa227219f647f34746af9565c18026f18792df51c3486713edc23aca8874fe24c330d162a07d7c43a2466f8e83281733fe266340b53135c95b5e9b3334e

  • SSDEEP

    3072:qsIbkttKFHyFeKLUVGGKusRLsLHahgKNJXtnuwrcemxkr186pGJ6PIsjCuuj2HyV:FViHue/DJELSa3HtnuwXkXAijGbjl8V

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2912
    • C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d61c9b8e17d0cc069c4b60999b812c81_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\EB1E.D26

    Filesize

    1KB

    MD5

    15801956adee1ead4470b7747840cb10

    SHA1

    a6c57c5921619f2fe55e4ed5037f4cbbc1060366

    SHA256

    6bdb5b8ec29b1c0dc1d290628e990cd20afa360522ea8d8e237fc4781528545b

    SHA512

    5028aae78bd3248bf6645350c7b9f35662753a89701bc57e803db09ec93b58ef1b1fe136af8b1ea0dc68547d9a1f4d26effdb9951fac27abfacbf11284218412

  • C:\Users\Admin\AppData\Roaming\EB1E.D26

    Filesize

    600B

    MD5

    e331aeaddfe6411af7649825479fa9c8

    SHA1

    94e93745a34beb94b178e3b94f840fbd6422c101

    SHA256

    c0041c1d6a5c4d2a6bba2723800a7a024050bce27e8b2ffced3647bbf8ce88e5

    SHA512

    8b2e5ecdbd92b1b34d0ef3800ddf10555f125d3a2d24d374a76f1dae6885d2cb88d9df7f1e2513f3b24012fb6fde541c111959a2b19bc31a173c8b2907ca5965

  • C:\Users\Admin\AppData\Roaming\EB1E.D26

    Filesize

    996B

    MD5

    37ebacf99f25a2e8fa2121d5432b31d8

    SHA1

    33e7601ec8baa99e70dd230e9a6941f3c5d02c9f

    SHA256

    ad662df9b6c0fe26c0f200c6d706e41f7c58101a3a4293765caa7d8fcb058bb3

    SHA512

    49b42955377d569847c4df1e0d6a060fabbbf85fae4a1a78a34e05c0b1116527b3842737b19d9b03451146c1eb241bb3c1c2680c6d55f92135ab2974c6c47243

  • memory/2584-73-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2584-74-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2912-5-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2912-6-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3044-1-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3044-2-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3044-14-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3044-75-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB