Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 04:27

General

  • Target

    dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe

  • Size

    167KB

  • MD5

    dd017e7b0351d853bd8520ea9fb0f7b8

  • SHA1

    05a9404e835949f47ff004a8c177324646c8cb98

  • SHA256

    ba40f29dca7b3fc768fc817d827c69a72073f90fcecf6c9633346f87a4567903

  • SHA512

    4f991f87ff1042f33ef51e50d0fe779b8b31ec218db85433d6416d1936938d9bb24a3799f27b8a9564020f48cb35e32c10e2ffd22c7ca09217d8e5a6c6aa9a00

  • SSDEEP

    3072:5ndcmKmr9bSEfya28u5xSQPeuVvQIe88KJoYqk3evgQkO6zc7f39tHHtdaCzpkx:5dc1m1Sa8yQPeNHKJo3yQa8/aCzQ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1376
    • C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\dd017e7b0351d853bd8520ea9fb0f7b8_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\9DEE.F28

    Filesize

    597B

    MD5

    c25102cc2418c5f39f3f585b10fed925

    SHA1

    699677f0f13568a548f9005f4979ebb5dc931be4

    SHA256

    c2f993ac92d6221846055842e2cfefed53d3c601c756a5c41f7015b5c9436cde

    SHA512

    9e25d9320c9e36a6771f1fba9972d4df23871d85e7f24edd8f1bebfc7f90920b391acfc7f5dacbf0fb873c79384f675eabb6849bd74cac21219ede5d03987f33

  • C:\Users\Admin\AppData\Roaming\9DEE.F28

    Filesize

    1KB

    MD5

    3ed5df95a87481e7d61d9c9ffd022b01

    SHA1

    3534b01c26a15fbf92394221b10f4843f288e259

    SHA256

    b587558a9c1133d172b6edd30170e255ef39ec6c5c33fcf015c40570a2c2866f

    SHA512

    62f7f9206c2ac93203a3d0eed7e247c8e65489027beba6b2ee5529fd80e7b52b434ba2484e43707692ce9bedfe7926c120fbb5c48cef6658abca7ae3c8b00c91

  • C:\Users\Admin\AppData\Roaming\9DEE.F28

    Filesize

    897B

    MD5

    21b2715cd09b8c7368f81001f85d1f7a

    SHA1

    ea60e73c99be2ddee3eeb11d38003708cd47364c

    SHA256

    ab66e822040bba06fead77cbe754914a2dbd2f7c32eb488457719b8967c445eb

    SHA512

    2162684f1d961c73a81d9d0df94562b9a2d72d88f14228bc8eb78cc2de5472966e0dbe3aee552a597adb725b2fc334941c5c78c407eac8b162ae6cb30f97d6b7

  • C:\Users\Admin\AppData\Roaming\9DEE.F28

    Filesize

    1KB

    MD5

    8d92f5f750c22842ef8b9461cfd69d2b

    SHA1

    22871a725710dfb17bda9fb0adc9248f9b96747a

    SHA256

    6669521a8abda14b88b3aee97680929b2dfc71fd81d83580181e71fda4923412

    SHA512

    1d07bef325104b925e1bbc818ec05ebef7dbc3868930194cea8c5866937c516e81f389a298a480fcd1fb2795573f4f4212750b1a02ab014ca6bb896e84419881

  • memory/1376-7-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1376-6-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1376-8-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1908-18-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1908-80-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1908-2-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1908-1-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1908-183-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2456-78-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2456-79-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB