Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 14:55

General

  • Target

    ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe

  • Size

    175KB

  • MD5

    ec0b8efafb6aa8043ce6e923ab6e64be

  • SHA1

    6b8cc0c2430750d1d4b2a2a0d190a95eac46bb8b

  • SHA256

    bc4e184421188a6f3899f637bf3074f0fead80f806e069cbcd7e11d0640b5301

  • SHA512

    8c6d34f349504dfc840634a14490b9a77088d025efc58acd7177981cffe0695bfaad154708be0d4abeeba1891f2f67ed0d0887b61020426c6a532b8a195ded46

  • SSDEEP

    3072:hjM1X4NZ8POD5njLC8qkFcmphvg3Ba7Ecti0d5rsyTvOL+kb041Av8A1:iZ4NZaMLC8qkVvma77t9wH+kbHs8A

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3320
    • C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ec0b8efafb6aa8043ce6e923ab6e64be_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\A7A0.D1E

    Filesize

    1KB

    MD5

    2ac05de167b5f166a8515cfb8141ab01

    SHA1

    ceb85be3c0e7e6d79db649ca0adb4d86167fde38

    SHA256

    7d7c782005efdba473ac8850560fb9467c047dd7ea9fc4d44f7ee680b85e022e

    SHA512

    9f63047b3a7365d2d5b90444da7040a0a1596060e293ac70c197cef63c4a7abd7a5c48452f905bbf892093fb42372890d8017f90019c7fc90d5917cfaf369194

  • C:\Users\Admin\AppData\Roaming\A7A0.D1E

    Filesize

    600B

    MD5

    9546c042225dc6fcc6ce04c8efa9c074

    SHA1

    1dab3670dab0b9025cb3e37f2510051c76febdf8

    SHA256

    f43d9c6a92c1f791b5cc6f60f27fd77ea367af8b426debdfd6f53016ce363d36

    SHA512

    f8d4a4b10b26c50828b01ff153500d4372da99de0a7084f4efae005fee4493f374cf01c4a5f6b7de7d206580ebd56837003b01ca8aed61c5625f9272951089b4

  • C:\Users\Admin\AppData\Roaming\A7A0.D1E

    Filesize

    996B

    MD5

    3537f0d1acdd70d42b861a895d3d26f2

    SHA1

    2c318fb82bb3f70c66c7510a3d049a5b6508bc42

    SHA256

    bf9a68f0e96de7e31dd6e78a58fecd9123014b9a306acd130fc320604139d32c

    SHA512

    687ef74c4c072c32d28c8fedfbaa07995b3351a0eb072255b1f60f77894c611be369fbb4065384933d8ed57627f624f1192cf2412bae21f309366c3c81a578a9

  • memory/232-75-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/232-76-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/232-78-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1460-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1460-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1460-14-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1460-73-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1460-179-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3320-9-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB