Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 11:17

General

  • Target

    JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe

  • Size

    164KB

  • MD5

    0d4efbd79a37623d6369dee3c5b064a3

  • SHA1

    2407501e662580dfe1060e66598439e33835a089

  • SHA256

    213dd5b67ceac216ab5b5f66ef9b3e57880139dd8d3f84aaac942e27cde21799

  • SHA512

    c8b94bc4cdcba5249f4b4f2f4ee2a051d9d394d840a1a94e820319bd7bd1187f1ca1f4d537ee204b4348d5102747c6f59fafc8301648b63f0697f041b8e81bf0

  • SSDEEP

    3072:LTXmsHhK9s7K5KlAPm/6toqdamFpQHF/Ji6phss0jBNX4hkSDe+617PZKDF8h:OsHcq72KWWQamFMriy0jBAe7PZyF8

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe startC:\Program Files (x86)\LP\BF82\6A3.exe%C:\Program Files (x86)\LP\BF82
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2764
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d4efbd79a37623d6369dee3c5b064a3.exe startC:\Program Files (x86)\674BC\lvvm.exe%C:\Program Files (x86)\674BC
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\25E67\74BC.5E6

    Filesize

    996B

    MD5

    af317267cbac2b9e9e09ac93d9c24e61

    SHA1

    e8f237ff8876fa5901e5e9841320768482660972

    SHA256

    8f13915198dbd319bf085c38a675540f3c599bc55c07a03fb9b24076b40b4c7f

    SHA512

    c0a348023f93a2db9ad83ecbed02935b43ba29ad139943f168b4384764df53246734ca63d997b438632f04bd02b0a761bab0690f3dad7142c522f700b7650816

  • C:\Users\Admin\AppData\Roaming\25E67\74BC.5E6

    Filesize

    600B

    MD5

    6fcd1d8cd852173f0be81edc21d9eaab

    SHA1

    d5ee19d7631383660508d72e6fe8544c9dfba31f

    SHA256

    0c7f139fa6f93dc525c46b4f3f5b665e8602284990e441d935de8d4be62b8801

    SHA512

    caf5df133665bcb259d718f99bfddfc28137d4118fcdb00e4b8de0264d195da602ff4e2d3cc4c2146a97e4292562d00865c0205d607a0a6328898020911d7db3

  • C:\Users\Admin\AppData\Roaming\25E67\74BC.5E6

    Filesize

    1KB

    MD5

    0b5e63e8151c2c001b3eb1ec6c7b7c82

    SHA1

    384040316ffb77700b1d2d32bbc538bd039fa291

    SHA256

    5a5604fc50c603a4d9be449d967ec527337f7f5706ea95d81c16be7315a1e1bb

    SHA512

    387960f7b0a15330c8604b2ff1cc9220d78d5478c99b1123b26d91aa084f0657fc3d2dad1671397a19d60a01216652531561863797746daa1ff67c8a0b0aeb2e

  • memory/2228-125-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2228-124-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2764-14-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2764-16-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2852-18-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2852-17-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2852-0-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2852-126-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2852-3-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2852-2-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2852-292-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB