Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 10:11

General

  • Target

    JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe

  • Size

    164KB

  • MD5

    0c0d20280c10e0d9974a125903dfceb3

  • SHA1

    a92aba188f4d5500230d9789e17189d6b389d904

  • SHA256

    257ecc779d14a601ec0815b0c033137c9cbe4a450385c0bbdc989549cb41a76b

  • SHA512

    880e11c0a2b3d29638a2d5caef6cef631044a74ba86f46b62f56102fba9942c697c44eec8c5e2bfc11d8a81cd4f0563d6e103445322d908055454a3328b7ea66

  • SSDEEP

    3072:uJFzJVA/H2HlLiPxewbim34iXRSG+sZZDb5f/0T133NV9K1FmH:K1JO/WQdbim3bScZt/g33NnK

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe startC:\Program Files (x86)\LP\2D99\7CD.exe%C:\Program Files (x86)\LP\2D99
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4648
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0d20280c10e0d9974a125903dfceb3.exe startC:\Program Files (x86)\AD3A0\lvvm.exe%C:\Program Files (x86)\AD3A0
      2⤵
      • System Location Discovery: System Language Discovery
      PID:448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 440
        3⤵
        • Program crash
        PID:3136
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 448 -ip 448
    1⤵
      PID:4824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\96EAD\D3A0.6EA

      Filesize

      600B

      MD5

      8f814ab489497cd840d468eb8944ac43

      SHA1

      37c2751ccfb4f5a20fc7bfccbf2d06fa488e33e5

      SHA256

      1ae2caf104d61c597d0f71e34d39271ce112ca8bb01f6ff0c0d0e527d09a48a0

      SHA512

      da809bb55d15860cd8895fa41b4dd264df957d2182d8be902bb1e74e39c6b1c533fc242652b5e600bdf48226628fb1917d237c141c1b1b1e470c106a3a9703fb

    • C:\Users\Admin\AppData\Roaming\96EAD\D3A0.6EA

      Filesize

      996B

      MD5

      c1ac65539d2228493448f1fc6f3f85e2

      SHA1

      1c1fdc01ce14dd4ead9b218f79fdeca835638fe7

      SHA256

      35e3aa5234100a668d770a7397dfa5f3da7ca70ee243351aba91f24c867bba2f

      SHA512

      7161598a579f54803e381857f628bcaf5df25ee4e0ed30bd982333cd966573afe7aa13eda5dd810624d6de564c8e1b7fb79a6dcf834e5171c030cb0c846586b9

    • C:\Users\Admin\AppData\Roaming\96EAD\D3A0.6EA

      Filesize

      1KB

      MD5

      7fd405badbf156d78a51e189db5694c1

      SHA1

      bbb4598fc795a30a33471049eff83474934744fa

      SHA256

      f4abaf1f1f7cc3125199e50632a8d06a59570cba247844fb2207e13a98f2765f

      SHA512

      8cd2d09297b4c33d54bb50b67cd2add542e92bfba86c25cb81841da778b86fa28072cf62be9f6d1f0cd8c7522765cbf268406f519edf8da0cdc316ff1e896a6a

    • memory/448-139-0x0000000075700000-0x0000000075739000-memory.dmp

      Filesize

      228KB

    • memory/448-137-0x0000000075700000-0x0000000075739000-memory.dmp

      Filesize

      228KB

    • memory/4308-140-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4308-19-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/4308-20-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4308-0-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4308-4-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4308-3-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/4308-1-0x0000000075700000-0x0000000075739000-memory.dmp

      Filesize

      228KB

    • memory/4308-310-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4308-311-0x0000000075700000-0x0000000075739000-memory.dmp

      Filesize

      228KB

    • memory/4648-16-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4648-17-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4648-18-0x0000000075700000-0x0000000075739000-memory.dmp

      Filesize

      228KB

    • memory/4648-14-0x0000000075700000-0x0000000075739000-memory.dmp

      Filesize

      228KB