Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 01:03

General

  • Target

    e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    e40061adb0a7d4632d60dd05a141a9dd

  • SHA1

    b2be93887080ae26bf970ed8445fc8220721fb13

  • SHA256

    8b46106985b66c08217ca954ce45e0782cc9656fc7ed2b1fe189b2fc8bd21281

  • SHA512

    cc2d2acfc8ae52991d17021a71a9b4cba5390c7f668ba43b9be1b0b34c5ae56c3ba07dc05ace84fd81208aa05e1874b18d926bbb802bbabfd2cde7b8ab5942b6

  • SSDEEP

    3072:GJ4ujspDuTsIDV/gWtgapfGOLxJUgi9WSV4x7KEigdG:GJtwSsIJ/g9apeOLjb6VV4M

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2836
    • C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e40061adb0a7d4632d60dd05a141a9dd_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3A8D.9E8

    Filesize

    1KB

    MD5

    dcfd67008b43377b0ec3dc240ce6b55b

    SHA1

    4340ab799c9acb6f0e21a5d0c1d27e2b9d63b75b

    SHA256

    ab8ce8afca179a1bc20ed73833f3b818ee660557f2a14ffb20a285cafec4545f

    SHA512

    7154cdeb423fc12118ed3093e55a8e3f8ac62dbb2d6be71dcd7ce98409f0a2cf680cc3386dae43d5a2e6ba01cc70adcb9a42f186d0346742aa54a5567fc09ed0

  • C:\Users\Admin\AppData\Roaming\3A8D.9E8

    Filesize

    600B

    MD5

    1844d2660fc6bbcff9515fd6cd60e2c4

    SHA1

    509ab67758995e56e4dbc0e96b816607432372fa

    SHA256

    7bd9cfdb6263ba9dd8caae4a7c029c0dbbcecb8c05bd2e768ae6bc0199b2540a

    SHA512

    e696366be4eea3be06eca0db8016ddbd369df3018484ecf475c40ebb988bd5219022b33cf39df2bb5ceb8a09248e11cd12768ba90913a8e6b41d7ac3b97066e6

  • C:\Users\Admin\AppData\Roaming\3A8D.9E8

    Filesize

    996B

    MD5

    16dc69611d5a7fe22e1837fd3e300ed3

    SHA1

    0530aed6b5f3296cc44a3da62f1441528b6e1fb0

    SHA256

    06538e0769c71ef72dc69f7945412d5e3dd83edd57d4df2f0349fc656a0b68fe

    SHA512

    6776fcf2d3ff24f2a459778504665e0b6cd234a4222a264e6daab6c0c9276191fce200b6fc0c789ccc0ac4ddd515dc67bad7ecbcb477939ddeca56d1de7f02bc

  • memory/1508-89-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1508-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1508-209-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1508-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1508-15-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2180-91-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2180-92-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2180-93-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2836-14-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2836-12-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2836-13-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB