Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 09:53

General

  • Target

    ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118.exe

  • Size

    169KB

  • MD5

    ee314beed37dd444c4a6b1c5f6de4487

  • SHA1

    17787582760b4522cc92ac218df3c3774a5b38cc

  • SHA256

    192b3c07d7331b338bc400ca0b8c12dfea74fed83363992a801e6d0e1654884a

  • SHA512

    3d6ae0cf2ba47e9d7b40a5ebc2df1f0394094ce1906875365978e16f885fbb1a18e6ad018b380b08bc47636677a8b311f74ebf1f50aa87cf662862bb5038d64a

  • SSDEEP

    3072:ZYGy9/koA4KzZRZtDb6n7MckPJHgqH9OZxG8YT1jKbvwuCXhgbGtV4tNIHlol49b:WGyNkhfHDEGxgrxpYTNLGtNIul49qSMQ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118.exe startC:\Program Files (x86)\LP\053F\73C.exe%C:\Program Files (x86)\LP\053F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2896
    • C:\Users\Admin\AppData\Local\Temp\ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118.exe startC:\Program Files (x86)\89F9B\lvvm.exe%C:\Program Files (x86)\89F9B
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\F1B89\9F9B.1B8

    Filesize

    1KB

    MD5

    dac408d2a56157ceb232791b73db9075

    SHA1

    e4a23f0c8956dd545ecb2e31db75a5f856fe0802

    SHA256

    0fceb80cc52477cdff6cab10e4d75e4d581e4fe60f0442cdfeea19d1609a20ec

    SHA512

    850322947554135fece00792948e7362fcbdea960c4c5a257be5ca27d96f46211684645c6c4d2fc08f00b0b73d022f99379b94fe80dcab0cb139b2753cf3f873

  • C:\Users\Admin\AppData\Roaming\F1B89\9F9B.1B8

    Filesize

    600B

    MD5

    52fb6928134a2f58c1646dc5e55870f4

    SHA1

    bc5f378129d0f75f84c6dca39c6a374723c241ca

    SHA256

    ff9d7f0d27e03457281c3670271fdca4ead7228ef4bbcec7a8e457cc5c3a49f6

    SHA512

    1858384b6626ceca158c89d9d3a61d4b8fa4cf6cb21cc6f693809eb292ee4f004ba6caeb16c2423774100f0cad11e3f79a08f36f3f2913e339de7d26d5c75e86

  • C:\Users\Admin\AppData\Roaming\F1B89\9F9B.1B8

    Filesize

    996B

    MD5

    e67dafb34160e846e2efcf0822ca94b7

    SHA1

    e8ed45d005dfb4669a975ff7f7b26db9f4cf3ef2

    SHA256

    731b5f9eb8900fa96b6e6e1c1f031038a8a319d1a937a017c18e8702a2ca2a14

    SHA512

    2f9c1425a088201a54d6f2b348a9a1111164043e374b8819e3dce50b00b72a31e48fa31937a813790457203ebf89effa1140bca7b100176acfe0a9022e059273

  • memory/2100-1-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2100-3-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2100-181-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2100-15-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2100-16-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2100-81-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2404-80-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2404-79-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2896-14-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2896-13-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2896-12-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB