Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 11:55

General

  • Target

    JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe

  • Size

    185KB

  • MD5

    0e0ac0f1e5b392d635d34bc3369ee155

  • SHA1

    70ce8250d0da2bfa5a0ca44d54083269256434ba

  • SHA256

    4cc039adfbacf1c0a30b8f6a5d08ad372c187d7a836455197b2c5870e3e4b0ae

  • SHA512

    9463f39e904800de50eaa2f86f29ed580209ed589cea0fe61a3fa896b64b51d9238ddf46ceaa94686aa0f938bb59df81079cde999517c5700b2a89ec0bbb4756

  • SSDEEP

    3072:I1HoHq842/wG+HZHV5VQ217AP04by0aF3FRnXk3fjf6pitrFar:I1Mzwx5tQ217Az+RFV9X6bwizU

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe startC:\Program Files (x86)\LP\1A9F\EC6.exe%C:\Program Files (x86)\LP\1A9F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1856
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e0ac0f1e5b392d635d34bc3369ee155.exe startC:\Users\Admin\AppData\Roaming\F3AA0\B643D.exe%C:\Users\Admin\AppData\Roaming\F3AA0
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\F3AA0\02F8.3AA

    Filesize

    1KB

    MD5

    e473422386af36ec27bb545fde3d83c5

    SHA1

    1c7ba730e3e6af2d9f97c9ef755eec556015221b

    SHA256

    c5fb008300aeb128ab128bf32a426d168a174e42b9b0d64ae51020fe1b27e199

    SHA512

    aa0a164e9c63a393923b4e4198f7b149f53c1040f0e6dc3057d01c6266a5b8a93ec4c274673ac6150b5659f4a85996340aa5b4ca6fe0e2b673fae6466b0ef4e3

  • C:\Users\Admin\AppData\Roaming\F3AA0\02F8.3AA

    Filesize

    600B

    MD5

    3991d84725195f367585c6d59a6aed1a

    SHA1

    bbc93060a85f0d58e921ed3ba3cc72c827786054

    SHA256

    c1a4d58ca4cd8bcaa23eeef936942578d382ba1e31429738ba7862c0fe3e3d69

    SHA512

    c734b2aeaa85b1695b1fc9ca4dc34c8cabb194a02e0bb4ab4a9474588194b60af881e07a13eb2c2fca360a4e5f840a499a1a70ecb9ce573b135dcb567ff646f0

  • C:\Users\Admin\AppData\Roaming\F3AA0\02F8.3AA

    Filesize

    996B

    MD5

    fbad12bc7d053a02f12f45acbff962bb

    SHA1

    7dcb915ab0696abb81964fb84e3c3de440d14914

    SHA256

    9e44c8a6bfe875680d9679fe3139ba2e03fa5734f063949416be5e7ce19f056a

    SHA512

    212479786e02fa0868eee8f50e5148665e24ec74e4937090630c14b755aabb1bd0f393bd5fa9d98aa801fddb79d2667f254af5ef38c7185173612b7f6793b41c

  • memory/1856-12-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1856-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1856-15-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1960-1-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1960-2-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1960-16-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1960-17-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1960-181-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/3028-82-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB