Analysis

  • max time kernel
    140s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/12/2024, 03:04

General

  • Target

    f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe

  • Size

    171KB

  • MD5

    f1fd577f429914f70f4038ee16d07b8a

  • SHA1

    2831f0e60bd34e6afc2ed46b57134b84ca0077ea

  • SHA256

    c0ae6270f99056daf0f98ae5a411f8a70b008c81a027903003d3fac37d16f56b

  • SHA512

    7639a226b57d9ac94543586bc5e5d1a288acdded7eb089894b6f566c6ffd0bf9d860c366eacae5f8e4a42e3f4949d4aead0c572cc5cccf1f01065e905923af2b

  • SSDEEP

    3072:sTGJH2PdRnIOKQHrlcMl7lSF00/pmbX559MgUhfP9/YQYh/bfkkP/:FWY4HrJ7lr0/pmbX5fIP9/Yrh/bfk

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4704
    • C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f1fd577f429914f70f4038ee16d07b8a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2284

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\5662.E40

          Filesize

          1KB

          MD5

          f946a143a6627e3e4bd357efe25436ac

          SHA1

          4396244dc59e4c81543321f30823a240226ac946

          SHA256

          da748e38fa6a6a636d24fb64044299a80e49e07b28a600bd81bcb34e3a5d3bc4

          SHA512

          2f586a33e08b82a188b9757c1ebf3f3c9e8c3e7daaa10a2d69c312ebc6fc1d5998548814b38c2b04248f1389195a013bae27cb4483c88f3e99e8b8130158c60c

        • C:\Users\Admin\AppData\Roaming\5662.E40

          Filesize

          600B

          MD5

          62e4a2c9a1847808cd7672b00506be69

          SHA1

          6885c8d2b58e56382cb6ac044b6b131af9b8480a

          SHA256

          b442baa78a072fd8626c88c7367d374d30b19226c0d10fe9f40acec034024efd

          SHA512

          d728f281a65f870a990046f8390db411aeccd06f800bc133abb02e57b49268562188c178512a4fd6b6b326a726cd94752226ea3329c5eddb9bbb95316a57b942

        • C:\Users\Admin\AppData\Roaming\5662.E40

          Filesize

          996B

          MD5

          ee66e1d1da7b8377e298fc76ddf6cb89

          SHA1

          2610b6f1346afabf668911b508a15bef1c93478e

          SHA256

          e0af191fa0b4f710a61a6e2b46940f0ba11d278d07ff69bb92f096feb3cb6c48

          SHA512

          fc9cbaeec689aacad3b95759f05d1678a05f964fd6931e4cf5a06d6c5956049145531a9d6c0123f4f167568dae71b048cbf97fc9f5ef71f95dd75cbdbbb5db8f

        • memory/2284-86-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/2284-85-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3252-15-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3252-83-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3252-1-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3252-2-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3252-195-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3252-200-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/4704-14-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/4704-13-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/4704-12-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB