Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 01:25

General

  • Target

    e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe

  • Size

    189KB

  • MD5

    e4129dd49a25fed941390c3c868a00b6

  • SHA1

    fef286ad794c1030b0d13c35352f955a9675e3e7

  • SHA256

    b97ce8b785b7796c78e436357781c54c139750744a2e48221c5e11291df644dd

  • SHA512

    68c692c3a2fea5130c43f4fbdaf36f18f67719b44f2ac558c8ed32fec80e010ce3dac3848c62054907671d356707e155d33d2e2fd5a7497d1e0c65e224f873d3

  • SSDEEP

    3072:XhYBm4OJInA3dDresjpTliQEZoSbzj4za1uJTNUGe18XtkOxgxxNWTrCIIgm:XhOm4AInA3dXeSVUQEZ/bzolzVVO8q

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2556
    • C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e4129dd49a25fed941390c3c868a00b6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4FD5.234

    Filesize

    1KB

    MD5

    58398bd912e05233ea49f0687e79435e

    SHA1

    95251bde8261cf16f3093aee843ae00b0c50b2c8

    SHA256

    f87d57b5cfda177b8dd8ccb30b786284f55c08158c39fc5667f150e12ee2a1fe

    SHA512

    b3a05c03b89071f7d1d84460a13182d1b19d3bc7096e7ce0ffaf6f5fb2509a2562035551795d7fb1b0beec44e8f2304b8d0cfce002cd2b40d26353d56c4f50d0

  • C:\Users\Admin\AppData\Roaming\4FD5.234

    Filesize

    600B

    MD5

    83b8a4d73b65f44aefb9109d52ad339b

    SHA1

    e83c8fd448eb8c24d4f4d532aa3e09560ebe2c1e

    SHA256

    5794e91bfca8d4c422e31d11616337d94b5a2451a12e39a58884f4f17c1f39a2

    SHA512

    e93f9f742bf6b512c395481c1590ad8b763ef9f6954db13e45a0ddb835a041090e63fdd30a47282562b87d92ea1f56fb90000735cf76c12b7a1e60258f3b0920

  • C:\Users\Admin\AppData\Roaming\4FD5.234

    Filesize

    996B

    MD5

    77dab33af51d2e19a3dcef017fb86b19

    SHA1

    176df9feabfc145657e4e36d3b3cf881c7df86c7

    SHA256

    d0613a2ae691186ff74fd595e6136e55aea5008092abbf4bf490b4188c6d47fe

    SHA512

    7c21ae70111c7e0facbe6b59960dc2fe1d3e33101ebbd035424a624aaf11c20ef93e68d08a6ec68506685c7c35d31d5ad851ea57eaa2868dfea31b05e9d8660f

  • memory/2556-5-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2556-8-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2556-6-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2912-84-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2912-85-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2912-140-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3032-15-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3032-1-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3032-86-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3032-2-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3032-176-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3032-213-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB