Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 13:18

General

  • Target

    JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe

  • Size

    166KB

  • MD5

    0f8ff1d02f4d2ab438537afb36cf0bfd

  • SHA1

    468fc26a61057e42e34fd9d7ca567d81b4fe7b07

  • SHA256

    27dbd55f0a916a37c858ebcad87c4fd4b56d30768c6b8fad1b7bd52d3da9321d

  • SHA512

    c9460d922a16272e8c902a2f9b240e811a12903265a9d907b5ee29fc5c7dd67d705ac22115de815626619f5a1511692f40a3a456ec4f9ebddd37893e6ff82c69

  • SSDEEP

    3072:H45D2T8WZ9Et60okcy94lywywBs6zukCSQlx93WH9wQ/QRgpcNGSH2RCxzo:H48pEt60o1yMyT+sRhT93fQ/Y6cNGSWK

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:412
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe startC:\Program Files (x86)\LP\DF6A\5CE.exe%C:\Program Files (x86)\LP\DF6A
      2⤵
        PID:4856
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f8ff1d02f4d2ab438537afb36cf0bfd.exe startC:\Program Files (x86)\4A1C8\lvvm.exe%C:\Program Files (x86)\4A1C8
        2⤵
          PID:3324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\A654A\A1C8.654

        Filesize

        996B

        MD5

        58db29c79e2fe9054fb73838512231c7

        SHA1

        9cae32ac76d48573ac47a4092af773eeab2c0434

        SHA256

        d44e2a19f837ade8e9f915f4d0783510cd1b57c3969cf498df79a70075af3837

        SHA512

        969589eebe4a58e3ed1c00e15f19485db4c88663ded20e831dda06cc1dadb631f4d3da7ebae0e500dcebd8e030474a2e5759e0263540742be5034609df9c080a

      • C:\Users\Admin\AppData\Roaming\A654A\A1C8.654

        Filesize

        600B

        MD5

        810c99edcc5ab9b69f8d71bc935dec8f

        SHA1

        5a4414274d34ff225f011cd77a3b715ba002aadb

        SHA256

        ffae6c9ae7022474c8d34a12ec0de1a382ebf0ee6508bee34c15080c64d49eba

        SHA512

        4c0ba89df2763e47bf5bf0366eb644fb37618a0291eea1a6b50a9759d07cb079688bef35a19ea6b718d99b2e5043c9b1cb5bcc4797e5b51ac398b65d4e0a1a41

      • C:\Users\Admin\AppData\Roaming\A654A\A1C8.654

        Filesize

        1KB

        MD5

        283064e34188640afd12269912a94013

        SHA1

        9aeceb5cb5bf7ae36de042a301ed0dffe970d305

        SHA256

        6cd5c622e1245f7d489a3d0e1b92bf3411c5907b217c1bda29a18406184680f6

        SHA512

        11361f908a587ad2f2c01bbd7a3ca4457ac09d2bd8159bbccc6f7e52ad8a725da25ce025a6b8b6ef8538930f5ed5b447148efe243cea0d1dba8efac3e8d566b6

      • memory/412-1-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/412-2-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/412-287-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/412-16-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/412-17-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/412-121-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/3324-120-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/3324-118-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/4856-15-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/4856-13-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/4856-12-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB