Analysis

  • max time kernel
    140s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 23:35

General

  • Target

    f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    f94050e6245132ac6fbffc77d5955f4d

  • SHA1

    5ea83c94f4f617682fafc192c9e368f2f5e427ac

  • SHA256

    5dae77a0cb286a0ed1e430bdc78c4bd986f3217a3d1c7413997a71b455071c56

  • SHA512

    ed63c3e006836e19ec19edd55859107d87df65333e8d70acc9d255ebe153cc90a1a64ca2cc375891a9dd5d4fad217a77d1be1b7e543a492697470077a08ae9f9

  • SSDEEP

    3072:rKtHuR794y5aCsHXeuuISPXS7hlIzF0jEA21tiNuvR17doa3pOR2vLadLduFwa7O:rKtHY79J5anHXPu9S0zFM9M0NuvRnL3m

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:2288
      • C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\f94050e6245132ac6fbffc77d5955f4d_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:2988

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\45D4.717

        Filesize

        1KB

        MD5

        b2817501d838810e65374244ca7da23e

        SHA1

        4f045020ac74dcd4e7bbc0045869cec30b7b4e5b

        SHA256

        9ce1b38dc7d11a4a57be3473e6f4fa583c842f2875683f0f144d954d8c774cc0

        SHA512

        de477be09e268c1f5678dcf394b7850a9386eacb5b56473d0a679c0e841db6a9a49a7ab876868f9f11089d271c13bdaea7c77b24eae90536285ede973095ea02

      • C:\Users\Admin\AppData\Roaming\45D4.717

        Filesize

        600B

        MD5

        7ac25f7e8acf450bc690730e353248cd

        SHA1

        b77afd4bcc72323afa85728d5502e6e2d5beb566

        SHA256

        d6c4d6dc3732e3a87b0dfec7ad1b3c4ad17b1714be371b9557794b9bf73e2cb6

        SHA512

        61658fa845ca6e4af56c83dd4d89a6d771a381ac491f544b410fd3a927153652ecf2142567c892addc38e59ea29e2fa7ec94153c23557b1781012e57b6e6a0f8

      • C:\Users\Admin\AppData\Roaming\45D4.717

        Filesize

        996B

        MD5

        c3cdf8269aa844b51cd0034534f67adb

        SHA1

        0651ad83d489439e3679759e6325ed8d45e8237b

        SHA256

        a10c7d51fd0f7b88f6c106ca0359bb828458c749ebaeced947ce7286ad4649d3

        SHA512

        28d43dccdddc8a81e9aa4792cf2e53d0fb8a8f153dae347d84e83032721942d80eb6848013c11f35bc6ca8a7a5412f9723e6b68d45844cf56fe49eca3b2c2a56

      • memory/2288-15-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2288-13-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2288-12-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2684-16-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2684-1-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2684-88-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2684-150-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2684-2-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2988-86-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2988-87-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB