Analysis

  • max time kernel
    140s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 13:08

General

  • Target

    fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe

  • Size

    174KB

  • MD5

    fba9a2cc10862e1c11054af84427f403

  • SHA1

    44ec7c5ae23ee951227317405ee56fc9318d29bb

  • SHA256

    b959a44137466a19ed109945596d9becc38d2925fb63b4305c9d6b432d1903d8

  • SHA512

    cf2cd3a9195986a231f228ebadeea5ddb6d08d7ffd0c24034e5d3944294b4ef9db0dc5841450dcd34216e201a13ba57753c3753dab8876e121d4c4470e881c26

  • SSDEEP

    3072:1OuRxqAK87oRXr7qk5M29raOXCA/XtoG3o0nW/t0GGV2II/T:1XqAX7eXr7q2FaOXCaXaB1/82

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:4948
      • C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\fba9a2cc10862e1c11054af84427f403_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:5112

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\C41A.F63

        Filesize

        1KB

        MD5

        cdc92e13c64b886bf83640941a0d944e

        SHA1

        5a9f84e65f2893209b24d53ae9282cb6dc57bcda

        SHA256

        1ac6d6d15209513757614c9cab7b8e2117967d2acab978b364cde7e3b46c3f16

        SHA512

        a3881eca3216f6b76ac99e066840e23031005f47cfec0d949fbd695a62258e5c8c87e5f7ee4cccc8e5eea0a2ce3bb89c966546cd4ec0cc3d351df43d8f5e1eff

      • C:\Users\Admin\AppData\Roaming\C41A.F63

        Filesize

        600B

        MD5

        67b83775e9e5d8efadb78c9ee1e02f71

        SHA1

        50631a26f64d5614dca6227afe44da1797f0e947

        SHA256

        de4774e9b992103913fe40cfb500f53702d8358dabfb88103421473a1233f0e8

        SHA512

        b6ce1923fa9c074c3acdc4563c1a636e750eeaaff38a886c38ac5547844c294be19092fed0e95d24d9d5ae38dc979ff9467ef91ce7d6b5381170d870c6444460

      • C:\Users\Admin\AppData\Roaming\C41A.F63

        Filesize

        996B

        MD5

        432e1e042c8874e42cf7252c350ee274

        SHA1

        5ea0b9beb91327436a2c70f4f4d9eaa83d11469c

        SHA256

        661990f86cc81dc4840505797502360acdaf924539a99fa286bf6594027b1f83

        SHA512

        e5e2388d0a50f5f9e234c6ff01d81c1a2a2b4173186d838224299a1c68b7c33f3b4248d378c3550796df7a14a598ae8ce152e8c6a3bf7089df734894b5dabd86

      • memory/560-2-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/560-1-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/560-14-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/560-71-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/560-176-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/4948-12-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/4948-13-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/5112-73-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB