Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 11:00

General

  • Target

    ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe

  • Size

    195KB

  • MD5

    ee6e122788bd4d50aa241068682d4462

  • SHA1

    e1d04dc2a97d146d9e66450d5e3707767731a334

  • SHA256

    c96bf2ab5f93ede2367b5921dcb543dfa4a32c71e5d61761cadb6e847e909f33

  • SHA512

    c426d0150ae9c8a0b4d8cc9f8bf625d1a0b51671a3f19a41124d6efc5ce66245c66fdc30f387769ce7c201a2222eabf02b17efb59ee22d54417b4e50276f5ea2

  • SSDEEP

    3072:WuLlwyWCwDBWvnU3iVLtFnD2/S7mx88pqazZPVlYYi/lmcvsokL5jcWeWNGYtpnP:tCCwUvn+DpqEZtyYiNmcVIOWNq2d9jP

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2508
    • C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ee6e122788bd4d50aa241068682d4462_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\5F45.CBF

    Filesize

    1KB

    MD5

    c52479eaec64d1a6b4f3d97ea7e870dc

    SHA1

    9946de7adb0673d369a996bb8693fd73b68a8008

    SHA256

    9de2dcd9bdfc6cfd25a72b4b344219a9e43343619e02927abd95f2e346f97de3

    SHA512

    e34d12502a621342f08ea0fff45bc02db1017e0a99b61b8e00ddc09c951a88252fc183f887d791195673e4b2f897afb5f3ff7a2c60e609b248f2d410324782ec

  • C:\Users\Admin\AppData\Roaming\5F45.CBF

    Filesize

    600B

    MD5

    de7428b247d3e209fd9988cfb8050f2e

    SHA1

    12214cf1bb06a873bbb4e9d31f48fb8c88016378

    SHA256

    d0b76eceddd58b3f89db548db0133f2548ef600d010f07c59a69a687db110e6d

    SHA512

    bbc7c105190fc84a8a643fde946388519006719ab5cfb0778c16edb7cccb410420243bf1fad71d9d25549911be9e3046f97dae7b0e3d3db63446abb2e86d1afc

  • C:\Users\Admin\AppData\Roaming\5F45.CBF

    Filesize

    996B

    MD5

    02667851d66da4a0b9a5a97d5549e08f

    SHA1

    ebe7a139c4bb479cf30e4614d91a11ba9111d62a

    SHA256

    75f7387448168515bdc3739e6eca953706330e18758b01c17fd39bc1c897da9b

    SHA512

    d0d3981f749f790e429b57d101a3c317b154302614b7657fe1b00dddbb95c7503967fcf03b5e56ed82c624a16a18910c1bb2687378f8d95c183cc36edc276bb6

  • memory/2168-1-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2168-2-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2168-15-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2168-80-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2252-82-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2252-83-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2508-7-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2508-6-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2508-5-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB