Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 21:56

General

  • Target

    JaffaCakes118_68732f9345efdf593a745212d567d526.exe

  • Size

    166KB

  • MD5

    68732f9345efdf593a745212d567d526

  • SHA1

    ef06f9e1a835ee10b901dfa7709fc1ca16553800

  • SHA256

    4ffa2714749a783ce2b5aaefdf26845b145a1631b2c0c027e8406e838a1cf5ab

  • SHA512

    9769036dd81365d4b0bda27bdc7cb2a0024682089a2a96b1f2c1bcb72e0b1b7e86a76d2b8a20a8811be25fcd61771a66b17c7d9b570cfa9e502fc68538c8fc98

  • SSDEEP

    3072:NKv0qrbcezlnFcv5VgT4+YPTSHXY/bufobOAKQTKxDJnHI/K/:NW0EjmGlYPTSHXerbbKFx

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:2040
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68732f9345efdf593a745212d567d526.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:2312

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\EA90.C55

        Filesize

        1KB

        MD5

        3a838fc6e4074ecd2be28de43961cced

        SHA1

        9f02059c2d4026c1cfda7e37c73508d2509af0b8

        SHA256

        174cbf2b4d8dc7999197c5a6cbc694e0c122365bd4ce855fa55c84e09b667fc9

        SHA512

        36a87af0acbd3cd26044d45c50697859e516cb5d38c049da78fb8aee702ee3c17eb2874d424c9be4ba79a6e1d4583347cd9fa3e2a598c58e120e004018b333d0

      • C:\Users\Admin\AppData\Roaming\EA90.C55

        Filesize

        600B

        MD5

        ecb7f67c03a49133245e3f8f4e561042

        SHA1

        d73627d05cd5e898767d179c593709eb7534d5a4

        SHA256

        4cc9a1eae65b8a60234cb65d605c2743d028841184bdc7d22b5b3cf9f16b014b

        SHA512

        fdb331f09d1e84949ebece6213176387705632f1c6a862737993d3ceb95b4696e71dd1b8b998f33a4e6ebac5cb45b40f8bd733a111f673daa138be6b0864dee4

      • C:\Users\Admin\AppData\Roaming\EA90.C55

        Filesize

        996B

        MD5

        54d6dce6ebd903d9a7eebff2e148257e

        SHA1

        f0a3742ca73f265e63af294362a223d5d086ea5c

        SHA256

        c03c2928d48924935a8f00d0ff9681bb13177a98a6852d23159f2d48843bcd59

        SHA512

        1eb30f581b7f3971fb7777a214af3cca1895beb3a8f1abf39076f717440652bf156845640bbde52d6bf2bcb32bd5487dd5f0b76b558b2dbb2b8a87633e41aa33

      • memory/1732-1-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/1732-2-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/1732-14-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/1732-74-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/1732-171-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/2040-9-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/2312-76-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/2312-78-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB