Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 09:11

General

  • Target

    eac9de824dd525be6fe5ecf0e46e90f6_JaffaCakes118.exe

  • Size

    177KB

  • MD5

    eac9de824dd525be6fe5ecf0e46e90f6

  • SHA1

    052dd575c5e17edfe7dd627c87d082f4868227d6

  • SHA256

    b5bcc79a7899a7d029b520f688129e445de66788bed2e82f7b1ef5f3303f7f41

  • SHA512

    6bec58c5acaa9b0f8a243d7f6e3d4452d8045f59dd7c52e24d6d41280c21bb00934ef16075c713ce6f0ef6535b4e6833bef271f8fb866214302ffeb3d1b09571

  • SSDEEP

    3072:xOVEDH7Mn9qnL6Mb/DE+nE3CEhjBi7OxDYqMTHkSzG3:sVKgnQnL6eDPmCEBBixHTHfG3

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac9de824dd525be6fe5ecf0e46e90f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac9de824dd525be6fe5ecf0e46e90f6_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\eac9de824dd525be6fe5ecf0e46e90f6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\eac9de824dd525be6fe5ecf0e46e90f6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2156
    • C:\Users\Admin\AppData\Local\Temp\eac9de824dd525be6fe5ecf0e46e90f6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\eac9de824dd525be6fe5ecf0e46e90f6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\0A0F.38C

    Filesize

    1KB

    MD5

    301af00935354addeac84403302659b3

    SHA1

    d938d2b23d3d5beca072395907709b4491c08d89

    SHA256

    6aaab607bd90b0cf3f379f01d9c1ac2d80114e73d8acbc443020eb3e08c90c7f

    SHA512

    8d715356b6d7d5d4a136000ead55c9e70507330fe403f20d8643e86bfbbd64f3389155f567ad5fb8fc5b291c567e54294bd3cfe029e898d5711dfe8975310cf4

  • C:\Users\Admin\AppData\Roaming\0A0F.38C

    Filesize

    600B

    MD5

    ef551cbd541ff06a4a6ad9cab886efc3

    SHA1

    64f9cdd31b1c61e044af43848a56a654e6bbb6fc

    SHA256

    9702c0d7f245ac23d1ca62d58a0f85baa029d56fda4b5bc4f3d34ca58f084b6c

    SHA512

    8c98607a6218fc3822d34fdc5e23b2c8d64bd0b690996729adf0f3200864f05a4a32b12a59df02d0c4266f57feb448959107d40ea3768651bba9f1d528bcd3d9

  • C:\Users\Admin\AppData\Roaming\0A0F.38C

    Filesize

    996B

    MD5

    7be6f794ce42ed0bf3bc2b9f9814e390

    SHA1

    2b5fc3417bcfdf068d0e324548b45aa336540e22

    SHA256

    93589d617b767383d2b1c781e239d8eed0b381e8b4aa7d3f859201a8d1fd62ef

    SHA512

    65db518197097f2b0f5d84fb6c2468615f3efa50c84efa37298d13424d12ab6e89bea313c7315161118394f8bb19809b32c8e125ec077036113b4b461e99dac9

  • memory/812-84-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/812-85-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2156-6-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2156-8-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2156-5-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2516-16-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2516-1-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2516-86-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2516-2-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2516-198-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB