Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 11:50

General

  • Target

    JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe

  • Size

    192KB

  • MD5

    7989142c320daaaff9b4ef00393f0c1d

  • SHA1

    8c99d429c2c1d7190adc7c6ecd8184cb307f0b43

  • SHA256

    8c7557664f097c9cdf55ee281f71a17b69204d56fcb0592b82f74340ffe03f6a

  • SHA512

    dd6de3c524e6b78554e46d96ae88db9da855bc13f932d0c64817204cb17a6290c9f2cc2c2ee5be70c11fc6c57ddc4a75414a1051f05d0f485ddda0888aec826c

  • SSDEEP

    3072:o7uHYiIzubg6s2ed48K5vEUnsWYkFq6pQxKx0V5r3oqdNWO7OI3anb/u9n5Z1Mhh:omYsbBK48Y8MYv6p+b3HWIULubXM

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1956
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7989142c320daaaff9b4ef00393f0c1d.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\7575.142

    Filesize

    1KB

    MD5

    c03eb515c2ac25ae569e3ab0ae19b4a1

    SHA1

    953ab2ed466d4936acb6e0a378c14a39e35798cc

    SHA256

    c07fd4366c6cf99e775c2fc8ada5e8b97cac9c5755b690120f87f1d75e40f593

    SHA512

    0eb9149ea402c1a1a04ca043d77e30d5a521e7e2577817147ce5da4f3eed6e0c4a36984123c9d5a54f87970d66f5fb4cb6a9d880060fcd49f2e542966e24b2d3

  • C:\Users\Admin\AppData\Roaming\7575.142

    Filesize

    600B

    MD5

    287351c2a52bbe792d85f3d5f4d5ef13

    SHA1

    534a17a246e62058d39275f1b7028f32aec67ad9

    SHA256

    cd9179674b7978b49a8e9c94bb9320116ae55224600221b09c4dac37ad220403

    SHA512

    8546eae80e71d4955ea428e758e107d0522efe8d970263361a88627bb2bdf6efe99e1b58a5b3c3e6404cddeee524cc630c918eba85064afc08b794998d586e09

  • C:\Users\Admin\AppData\Roaming\7575.142

    Filesize

    996B

    MD5

    2fef410818e49de4582c955529ba9c08

    SHA1

    4d5cc94c73deeda469bd1dd397fc77be965c4963

    SHA256

    38ce01f83b476081a6eaf4c70fb719458159abfef0c7313051dcb7e55a06f1e3

    SHA512

    86224b7e44bdee4d046d612da65a3c653e3dd8f691bcff88588d8cdbbf6f6bbeda214038dfd71cefa57070d59e52d206d1ac73f3c6553280508ec0b997e0af49

  • memory/1956-8-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/1956-10-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/1956-9-0x00000000005FB000-0x0000000000618000-memory.dmp

    Filesize

    116KB

  • memory/2296-82-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2296-83-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2332-1-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2332-2-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2332-15-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2332-190-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB