Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 05:25

General

  • Target

    f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe

  • Size

    155KB

  • MD5

    f27e3f76056154ebca5131a10f2a0ab5

  • SHA1

    3f24c3b5f80593ae6726b2c009dae7d9888a2c77

  • SHA256

    be3f5828d78904e924d91dbb266996cd58110fec81320af5a3f2d700f2b834d8

  • SHA512

    4db527c42097ebc011b02507c97ad814c5c875061c567df6c2031ee6780a7b853bb2485007cfadf70515da34abe09659923c2019f08908b33750ac20d2d39b63

  • SSDEEP

    3072:vw/9LWqGjWmpYCMg9kQyaW6ywE8LU/1Bd8A9GRikTlqZkWMwrw7DuC:vwpWqPmuCMg9kdIU/1oA98JWMw+

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1532
    • C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f27e3f76056154ebca5131a10f2a0ab5_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\B3C1.2F9

    Filesize

    297B

    MD5

    1d958f874f0689aeecaa68cf9c27db29

    SHA1

    902c451359fee78b6979890ab4be03d419344e7b

    SHA256

    8727e29509d2ac1d3aa578d2bd92dd00c1733d9f31e4390abd7c71301339f30b

    SHA512

    66717fb149b17dfdd7f8254a38a7e0913bcc256da0e9f83ed2892fa29774e2fc04f50dfb8472fe38ea1a1609fbe4991ef26e7d982bfa22a81e3dfc02a1d9ebc6

  • C:\Users\Admin\AppData\Roaming\B3C1.2F9

    Filesize

    1KB

    MD5

    d39ca678dd8098c54e21d00d27612e95

    SHA1

    68bcea5326d420083a14e56c638a2e5c8138b831

    SHA256

    61c493d735c535431f1cd8c39392908782d83cb5b16f62786483fd0016a62ba0

    SHA512

    76400d1dd66a923bf872eb2faa6909e8c6e06f02d6706325b04bdb258a87abc8db780cce3d190ad7b8bc92f561573dd0595d5698108a2bf294577a76dba87938

  • C:\Users\Admin\AppData\Roaming\B3C1.2F9

    Filesize

    597B

    MD5

    f05f05281b70cacdc2c05ac5e98c6a03

    SHA1

    4ebf84ec6890e1f01c158acff2a7996710cf9175

    SHA256

    b8a7f5635874dd6ab55d1185c5069f18703266c083ce99e625ae09e8bcc6f048

    SHA512

    5a3dcee260f8101507669da3cb687509c749c1ba7f1005fee81b5f701b00b8711da4c7ff6ce2b097d35fe1689c999d713094f0c1348b90d0a0bed6705bf873e1

  • C:\Users\Admin\AppData\Roaming\B3C1.2F9

    Filesize

    897B

    MD5

    aa979c852d01d0d17e313f8c1b8a2c61

    SHA1

    6b0ea8379f418ffa9399c87cce06e327e3375964

    SHA256

    435485e442272e6d894a4044d5d648c8b42b900d1fb78efc0a7ce584ca976933

    SHA512

    c120826770c95013dc2a7cb3071cd1226901a7965504e91ca6e88e6d13cd76997cbfb57f28d2208bb4940a67d34bb6360426b94d7979746ee41f51706dede3b0

  • C:\Users\Admin\AppData\Roaming\B3C1.2F9

    Filesize

    1KB

    MD5

    b7b08f4f5b38a90ea50f4718e2d47f4f

    SHA1

    666a39c030047295bc9a7903b96372275cb0ee28

    SHA256

    73a818139a7a32d94656dad9bb5dbf85ae083958abea4840a26ab3a27f24010f

    SHA512

    9c853a3c6fc1683fc8b17c58203569bec1f57414b4dd2569b74d8098940aeee8a32e273d4ce6da7f1645486bbee79bf3be2f9d49e40c37dcb23961d3c15212bb

  • memory/1280-82-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1392-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1392-2-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1392-18-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1392-79-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1392-196-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1532-7-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB