Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 15:21

General

  • Target

    ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    ec22dfc43dd72912b1a5428daf0bf137

  • SHA1

    e7e9c0cfc08807688c6372dec3c37b19be92ee60

  • SHA256

    ee1d85f6bcb8090ac766f0782d7be28153a8851899f4d23c81800a97abd68fcf

  • SHA512

    ccb660fbaa3391754fc303e82f29181725a77db93bcf7f54a8d3d95d1b14e8c4229a36ef9ad9f2b313b70022759a7bf7e8bbeb172030d37620d2f31c48d31daf

  • SSDEEP

    3072:ZHoI8+WdjePaA1q1WMC0XWuUKXK+kW3wVaY+Z4XFc5zItnwog:BoI8BYaA1qv3mB9vJZ0inLg

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2252
    • C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ec22dfc43dd72912b1a5428daf0bf137_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3071.CAC

    Filesize

    1KB

    MD5

    7d066e7e64d91c3e65600b62ea16859a

    SHA1

    242e53f6f491efc4a157bb6575958ae61608107c

    SHA256

    feacc4c9a0a18e4253ec2e40a0b595bf90da691badd1ad21af2390d598fc53fe

    SHA512

    5c21984ced305030d54058acbe8ecac0ea0917cbd4b3d6d846c103c97109628e1589befc1206814e2263e9a496d5c703f7fa84cd5a6754475e015c9f7193405f

  • C:\Users\Admin\AppData\Roaming\3071.CAC

    Filesize

    600B

    MD5

    e3f8a1a41567e7d4ad8fde0b040065c2

    SHA1

    002a0d18e70f6229652ab338f907a7735990a6b2

    SHA256

    321a9c9ff8f6e48b6efb3e0c7b7bd337f2fe04f201f7ba05415a63113bb6bd29

    SHA512

    9f2f3147cf6c1a36d25032da7a83f9231345fbd10fdfe238b45636df2e340fd734be5cc1fb9351a099e8f35e1c3ced16f744b642406334f7b8f3793df8c6ea0e

  • C:\Users\Admin\AppData\Roaming\3071.CAC

    Filesize

    996B

    MD5

    c0b8c0e39443929b826539325323906d

    SHA1

    3fb90a0de2befcc8c62b26f5cf6ab3d8754e34f0

    SHA256

    54c4707cb3101dd7084c8377d26afa70184c1268104b5675744d40a59f5b03d5

    SHA512

    852beb2643be41978547e96c53797e730dd0d237385bc5a6a219d173fe3555e95ab0a2dbb21e44341c7565ceb11eadf7e0d2c301881ca7591f7126fa0cd31e51

  • memory/2252-5-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2252-6-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2660-75-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2660-76-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2896-1-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2896-2-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2896-13-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2896-77-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2896-168-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB