Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 21:41

General

  • Target

    f5da2590e5938d982c22eab6a5f6d185_JaffaCakes118.exe

  • Size

    182KB

  • MD5

    f5da2590e5938d982c22eab6a5f6d185

  • SHA1

    42fe806f5872d9816bc16c0ee44e745d41581e11

  • SHA256

    9cdba55daeb92f0de2e841554171327576790cd52b265fa27d77191045aa5647

  • SHA512

    f955ec401d6207b351107abba984d0da8c0cf9c9f0327a900ff53424f3b8331ee811425aca171c3118c515c726d05bb53c408430c76a58e27770853367e1e8af

  • SSDEEP

    3072:CIh75WqHtNw8OC7/GWPcZDpjwN/0D0gjqE8NE5Ulx6Mi/pY8Efd:jtRNNwE/GRnjq/c0gjKE6lx6px7

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5da2590e5938d982c22eab6a5f6d185_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5da2590e5938d982c22eab6a5f6d185_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Users\Admin\AppData\Local\Temp\f5da2590e5938d982c22eab6a5f6d185_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f5da2590e5938d982c22eab6a5f6d185_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3780
    • C:\Users\Admin\AppData\Local\Temp\f5da2590e5938d982c22eab6a5f6d185_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f5da2590e5938d982c22eab6a5f6d185_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FF18.B88

    Filesize

    1KB

    MD5

    8418dd0d1f1b2493cef6bd40bdc4e167

    SHA1

    503569fabb78247c17baf3a40ef51ddfec46a6e0

    SHA256

    d406ac3404363021363cb9d41ca1b3a392bd43db89023c5ac67c91dccf152236

    SHA512

    20b4143f8c807f1bd601f07305fc9eca4e3439af482f19872b3a523dfc950070027ca1fed373e53321dfe290e1290ea04285971e238e209c1d3d0f32595346f4

  • C:\Users\Admin\AppData\Roaming\FF18.B88

    Filesize

    600B

    MD5

    0bcb325ad9bc27f48741e8efc46722cd

    SHA1

    692ce69c87a56d82d5d5d773306e521456e1feb0

    SHA256

    6d61f1a1eba85b7e25fa71aa41f6602fbf75c3bb03c954f37d2e6c36e93f5241

    SHA512

    a2727bb5a96c05f205080561fd7b58ce2b569df736a35c333252964dcd86df3769d7a1dacb91f2a196ceb07423f77dd48135d3c5c39a864f435dbf336111df4c

  • C:\Users\Admin\AppData\Roaming\FF18.B88

    Filesize

    996B

    MD5

    3c9004694c41bf02199d38cdd0d154ff

    SHA1

    367f274c5ed3c464986ef2d67a3c3d087ec41b0b

    SHA256

    288757fab148e1458e199289270a1d7cf594794e413258f8befea01b2f9dacd0

    SHA512

    576908c0938b2a052d3c646ba36febd7d7112e8d626d49526ddf28024c4763aefe84b3d13018b1cd6c7ab5af223db2ae5458e43c45054264e45f064cae9837fa

  • memory/3516-79-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3516-80-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3580-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3580-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3580-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3580-189-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3780-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3780-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB