Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 18:26

General

  • Target

    JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe

  • Size

    201KB

  • MD5

    1557fa7019d5d281a1b8c878bcf817bb

  • SHA1

    fee022f9e73695c68965db8a1ae86350b56db7c7

  • SHA256

    9c6f9ec885396ea45f06b2e426e7d5b2b942d60a1ab868a84275987c09984a05

  • SHA512

    ff25e02906a717eea3107846b08d4ed72f1e86f6f16eefe79c83a1b68e2e7bdda9e2ceb6a90bb848edf0c10f652211a0854db5c31eaa0930b364e9e54222386a

  • SSDEEP

    6144:VwGPqheAAyL8sg/z941Pv3KFsrhWF99+bksg+:VwGay4Pg/yR/Hte94osd

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:644
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\189E.49D

    Filesize

    1KB

    MD5

    6eadb091a8920c68a150fbcf5e2a87f3

    SHA1

    e9c9b3c95d1d2cd0f3ab40cc9f5471ce5abed24d

    SHA256

    846d30b78b9110c2bcd1905476bd18c6bf7e0b248ff698d746608643537114ec

    SHA512

    3de121345702c1a5f1450624a5f66ec9fa52588c791865281e0f99ec8c7158f6e0a08c0a61df2575b1f5cf4ffafb4e306469ea345e34e89069dc883481069bd7

  • C:\Users\Admin\AppData\Roaming\189E.49D

    Filesize

    600B

    MD5

    5042ce8efaaabcca5188e141495494c1

    SHA1

    234575b041a75d9611c95944a5399ac788814fd5

    SHA256

    880028725c79e2ccb4d5e1915840a6a6e3c570741a3c50ab37b2c8935e60601d

    SHA512

    251ec2fb1a3641c6320a39d225030ceaa5dbe1b1dbcb872a8a5c60670764c348db2d8b6b10a9d4c440644f57df3e5233dd1d4adee50630f6808c52db0ff655c5

  • C:\Users\Admin\AppData\Roaming\189E.49D

    Filesize

    996B

    MD5

    d7fbb0092898f24af0eeaec8b00d7f20

    SHA1

    0cd74415e925e5ea68f0d61038cb53c7b859b509

    SHA256

    65b3522e90bd9a93bcf48b405ab3d57a252803800648b80c5b5b47b4b30e88b7

    SHA512

    3deea38e944504b00ab8c5516c52c1e365739371c55b7e16f4d04a06c72273694d2200eb6ff4778c6d563b80faf1cb9e42906d0db92d1aae76ed1bfd4591b98f

  • memory/644-5-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/644-7-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2324-2-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2324-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2324-15-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2324-178-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2596-76-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2596-77-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB