Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 18:59

General

  • Target

    f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe

  • Size

    187KB

  • MD5

    f038c8abcb879e38bf27acb8db28e2a0

  • SHA1

    1c1fc5e80fd8b284607cfbaf9b8bf9b0cc58cdb4

  • SHA256

    bd8c4f03932fa0171cf1fbd040d50269c1e3b7c7d84b04975753b3247e4652db

  • SHA512

    637d73485aed793f9bada597a58593d8f5a0a9fbae862e7dea46fc6864c933bd5f84babcc1355d7418c5d147bc10732bb1e6408ad2792ed744011a8775d60f8d

  • SSDEEP

    3072:fb9fR6vPhkm9gDdMM9T4wYkgVGIeuK9RWZBmVPKCuoyH:fb9J6BkDdMMCwYkgwbu2VVPnuoU

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2732
    • C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f038c8abcb879e38bf27acb8db28e2a0_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2305.1B8

    Filesize

    1KB

    MD5

    9767935f6082a3d7e72d9a89ccbe761e

    SHA1

    9609f2326987637a6721891d5ae2a618c779a312

    SHA256

    5dba7e4edd859ad47dff80a361c51708017c1777cdaf0567d4c9022f0499bd3f

    SHA512

    519dfda71cf4e6cc324dc59d1a187fdbbcc180f19df763666067d85458e5cc14eb780a4a54e22886cf5927eaafa5403ba659a200b854a20f3ef821337f67b1c2

  • C:\Users\Admin\AppData\Roaming\2305.1B8

    Filesize

    600B

    MD5

    ac6b8b88b3616b6f86081fbb57f2e0e1

    SHA1

    c84c1f482457895f72dfccb058338ed5c79b03d7

    SHA256

    49b2d2faa4b0bc3d7946b2eb562f36771b9bf19cc99802814210d566f0a6961a

    SHA512

    693b982dd7d45d65c4f75fa76b4d999c1150dfb9562b9946c2ea64fa062a0766dbe2581dd8adde50145a272c526a700d2c5cbc116eebd55413b5eedf23ff0423

  • C:\Users\Admin\AppData\Roaming\2305.1B8

    Filesize

    996B

    MD5

    6aef75b55eb9245a769678f7233257d6

    SHA1

    997ab80077fff18c0f49e1a6a1410ba2672a4c67

    SHA256

    c3a4073eba801c2cc0c5791cf5fee45ff55e7dbbff3246ec23e8c6775d2d9c34

    SHA512

    b557fc45c2e19ba7e680f435ee984d6c6a0038eda64ff168d5157652085fe55200fa91f9493feb8e195fe5dc081396d05195d020e6bdb3b922bef711475419eb

  • memory/2732-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2732-11-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2732-10-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2936-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2936-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2936-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2936-168-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3000-93-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3000-95-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB