Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 11:32

General

  • Target

    ffb1758d5658f6b3158e3f547571f581_JaffaCakes118.exe

  • Size

    186KB

  • MD5

    ffb1758d5658f6b3158e3f547571f581

  • SHA1

    7a0a5b3ca7725de8fea6a8b4fc3548acb92ae4b9

  • SHA256

    b5ebd1807c7ba566efa0aa67411e13dcc41a2474a5c210d915dadd9e34c31cce

  • SHA512

    d7172613b9cc9d61464e2eafbb04b6623cca4bae28d5557b95ad9a0ce910d4ab19f9c9a5f245edc805157e552a2a981e3299ab1ffcf193a12429adbd045e7b0b

  • SSDEEP

    3072:vAhjPlxyPDatxM8NMW9jKIkV6kSSp91vorArlX3PyYgJcigrJBc4lj0g1jEW:vAhblxg2kZE7FSprvswaAiS/VljrE

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffb1758d5658f6b3158e3f547571f581_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ffb1758d5658f6b3158e3f547571f581_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\ffb1758d5658f6b3158e3f547571f581_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ffb1758d5658f6b3158e3f547571f581_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4860
    • C:\Users\Admin\AppData\Local\Temp\ffb1758d5658f6b3158e3f547571f581_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ffb1758d5658f6b3158e3f547571f581_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\1ED9.D47

    Filesize

    1KB

    MD5

    4ce1617fb92be4536dc2393f46206fae

    SHA1

    6a6977024d97c3912a959a24703a80014421e2e0

    SHA256

    40c8766bef782ec63f183fc8eaff99cc12088f095047744a40226a042d4f906b

    SHA512

    6fefce7be3412cd8f9a458c88aa5f1d2d204c872fced9f7b25dddd4a7fe8398378064cf6235e1565e4d6a37dae29cf36f50e86e8d251dd1a3b9c9d6ad93129ac

  • C:\Users\Admin\AppData\Roaming\1ED9.D47

    Filesize

    600B

    MD5

    3e4d8a751fc94d08e0b3e653bfd13ef5

    SHA1

    159baeee833b201414e925c5f13dd222036dbd9d

    SHA256

    9034c76a2dd08037b633de4479dd564c3887addb99dab1b4a88107161ccbe5e8

    SHA512

    cb671fe403ad4b962376e28c6529199cdf3fe20a8f23c73ff62bbecfd26bad8e7dd7a0f43b836f12f7f71f0f1a58f9127314c2b3d1d607d353ae457e7a92e9e7

  • C:\Users\Admin\AppData\Roaming\1ED9.D47

    Filesize

    996B

    MD5

    337d9b997c9378ee239c5ade64f6f032

    SHA1

    0eff3a67844f58a6b97a678382b8cb44beb3e7f8

    SHA256

    f260540117549091c67b7bd85121fefecb31ad87e00c3a7f465644122c8bcc0f

    SHA512

    9140979da1f05a1e58578546968280b0cd0b9d55989d2b2e7baa2a2039cb918d3f27c96d645161a173fad08d7423f7540a160153c47e0d3bb5a1bac9143c196e

  • memory/2908-1-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2908-2-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2908-189-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2908-14-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2908-75-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4448-79-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4448-77-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4448-78-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4860-13-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4860-12-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB