Analysis

  • max time kernel
    140s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 14:05

General

  • Target

    fbd644dbe1203eb4a7a0f0f002f2e421_JaffaCakes118.exe

  • Size

    166KB

  • MD5

    fbd644dbe1203eb4a7a0f0f002f2e421

  • SHA1

    7761777af35b9ac68595eaa9de86deec012e03cc

  • SHA256

    ab2e7570287a4ec38ad19bfad8991501c5edd58f0582b68a69275270ff6493c1

  • SHA512

    79e50f0b91ffebb459f05c1066cc487e9143c7945062e887f80d9636a11d64ad50dd0663261a80aa601ff0c707a55015defa4501a21a2d0d44794da5cfb76d94

  • SSDEEP

    3072:/8bn/Y5Juwre8zMmU/BAQepx2ztPR9FgRkKmKJ8eW:/0nwKC0meAX2tj2DJ8eW

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbd644dbe1203eb4a7a0f0f002f2e421_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fbd644dbe1203eb4a7a0f0f002f2e421_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Users\Admin\AppData\Local\Temp\fbd644dbe1203eb4a7a0f0f002f2e421_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fbd644dbe1203eb4a7a0f0f002f2e421_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4724
    • C:\Users\Admin\AppData\Local\Temp\fbd644dbe1203eb4a7a0f0f002f2e421_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fbd644dbe1203eb4a7a0f0f002f2e421_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\7BF2.351

    Filesize

    600B

    MD5

    a64f475e24ff8601f646a8c62e85ecd9

    SHA1

    461a6734619ca99907d620f53eb22048403e6f55

    SHA256

    a93110ea24789be6db28fba44a3d50bf4bfa601f3639f8393af381dc14d91271

    SHA512

    91a3393fdefa3d9b85fc4cfb320cb06c44c065501509250f3533aefc4e7faf579f7bc0cc165bc2afadca2cfb8b2ed298a084ba2c7195bb92d9b5a80334e937df

  • C:\Users\Admin\AppData\Roaming\7BF2.351

    Filesize

    996B

    MD5

    d9f66a34bd4c9536cbd76b1b862b006b

    SHA1

    7c1933e203d44a8a395756b8fabc10c8ae4cd952

    SHA256

    28059985a43c1bc47008d8c29d7bfdde2a50e4ebf38d94137143383dd7383bf8

    SHA512

    3a78b311ff7c1825bc8c1a5722424cee722de499b9107156d7ca1597c5fcc0acdb9cbd677818f8868e1502b92bd43e275467d3a108908b04015b4f88ce440494

  • memory/3728-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3728-15-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3728-84-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3728-184-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4536-81-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4536-82-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4536-83-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4724-11-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4724-12-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4724-14-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB