Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 00:47

General

  • Target

    JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe

  • Size

    182KB

  • MD5

    76a98fad0616b23e1e3778ad0996856c

  • SHA1

    220d7c7a04ff044dc91b5987c525b76fd075d371

  • SHA256

    0c8a14aac10761f9c283e4da4aef62dba8697880f8b7a8ce9f47e0db325cb9ef

  • SHA512

    444850c009dcc22b2497f412e1da8769c11b0db31d7a95332e813222cff002aa96c96d93a5dbcad97e5a632fc33f7038ccd18d3d07352258999e4756d15c9111

  • SSDEEP

    3072:9FBieHSOEbGyGb4gxhVS1z8Q3h5v5ZzcYH4jbJ4O13bddkXjjWF9FMt58r2:fFkGyIxh2z8Gl5Zzc9jbJ4ODKXnWGz

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1212
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76a98fad0616b23e1e3778ad0996856c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\B7DD.9BB

    Filesize

    1KB

    MD5

    63686d1a085d01fe4c7caf0ec537d222

    SHA1

    abc13cb9ac1e4a6e5615151ee9b6cce239d69d23

    SHA256

    e251202732c6a140903dec3232ea35415bcfcc3fac3e01bd667ed005b73b0b58

    SHA512

    534ed77a89b50171f39fa495c5189b23a502c94bbd1345a66a66d9d5404663b241dfa6838a25d3570bb73683e37e2097bbd85d7eed6a305f15cbaa87a4135ad5

  • C:\Users\Admin\AppData\Roaming\B7DD.9BB

    Filesize

    600B

    MD5

    cabf90d9155455d9c0c91aa513b3adf8

    SHA1

    4fa96c0966a49d7fc997042f35545854a23dfafa

    SHA256

    a45e885a2877c0db51d03301eb8426c6b8acbae9c76f8da5d0df8f287d7cd847

    SHA512

    c30999df4cc9a709eea9f7e94dde128d84b59da1cdc1621e3d36fc07d63b6f97814d0ffd52548c8132a175adfd0f0072ac38af54bb9c5903381be7d1662f8b0e

  • C:\Users\Admin\AppData\Roaming\B7DD.9BB

    Filesize

    996B

    MD5

    340866b40bed151790ad16af80832947

    SHA1

    4ccfeb2d11567d1afe57ddacb4e7b7f2b67b41a7

    SHA256

    64dcbe03d106c385fdf8bf2ece1b2235ed6c4bf45cc99b70aa9f99524a9b7bfa

    SHA512

    52f2a405e7e89982c581f1964806ceae4c9502f1cb75e748083747687ebaa5b6670e791e0061c08028a2fe1a004977acbb0dc89f4a27f13d31c1e78da8ee1ec0

  • memory/1212-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1212-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1372-91-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1372-93-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-192-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB