Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 19:19

General

  • Target

    e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe

  • Size

    174KB

  • MD5

    e2db13ffabda7b98f7db88c055f1ed2a

  • SHA1

    eaeec9fffa97e1e6ef70f143d7d33d713dab6ff7

  • SHA256

    7b0e5642727a1df949d626a625b679b3c1acba1e12e188e4075bf19170a20fed

  • SHA512

    dd78c7955737efed511d03d769ca6eb3f242a60c0dd9913b910702c1cfd1382d766e0cbd1da207779553848ab722cf1e9967a90598549093eaf9708a3e865952

  • SSDEEP

    3072:cN8KEFR+oANzCsw6063ag9ScrHe5pR1ohJxfe/NHj9c6:cAR+oAkE4gEue5v1og/p9c

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2080
    • C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e2db13ffabda7b98f7db88c055f1ed2a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\37E5.2AD

    Filesize

    1KB

    MD5

    387056ebba57bfa729cd93e79fe06d8b

    SHA1

    f1962ffda5a6490d7d26b0fd61a3f18c53239773

    SHA256

    eeb0a52b232a567dd7bdc1979f682b208cb17cbfa2e22ca08cb84f452eb772c5

    SHA512

    a4d767393b9805fbafde13334e63a55034004ffa995dc37df90f5c53d78a8cbea57789aad555241f2959b4e496ea39f4988a5bbccca26ef7ee4b203527fc7314

  • C:\Users\Admin\AppData\Roaming\37E5.2AD

    Filesize

    600B

    MD5

    bdde0b173b20b67dbeb6604107e1afbe

    SHA1

    84fc8b6e0d5db36de48044ebe2c02a73832e53a9

    SHA256

    ca1c74381d49240fb2bf1b7f5532bf821e9bee5788362126de5fbd0e908f7eec

    SHA512

    9cd3bdde3fbbdad4ead0ac349095f68e307c8161e8fe65544c4a71b98707d075d94ad4882e86c6bca17693d35044333ee6b5a5544b6a52dc9c2008b6f936474b

  • C:\Users\Admin\AppData\Roaming\37E5.2AD

    Filesize

    996B

    MD5

    977e647016f9d6acbab4021e826ef110

    SHA1

    bb3e7f471bf1b07530c07416eaa0ed9106fdc189

    SHA256

    a13106bde51122e698f75f4d11b12c43620fbd721c3851dd32ffe61b4cf93c47

    SHA512

    de58affd63caf5e05c51c2299df617d0b6332d52d9ebdf90b82e630d485d3bd019d04f1c42205864e185e117e9be3b35e4d2f8d723fb9e0120e235b7c6f794bc

  • memory/1480-80-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2080-12-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2080-14-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2120-1-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2120-2-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2120-15-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2120-81-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2120-147-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB