Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 20:28

General

  • Target

    JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe

  • Size

    176KB

  • MD5

    1794cdd710d6b7ba8b1b60f9ea7afcc9

  • SHA1

    36538a6eda4e155e81005958ed928d973529e0c6

  • SHA256

    ab30ffc64f2bb6581505a6cfb4cea9fd07d13b0e7c27677f68c3296cdbcae353

  • SHA512

    f811c8994d90ccc771507e8511ceae05cd6cdddaecc5de323e0b7600afdef305ce909ce5bd0457e9cb799a539deebc1a97d7e02a4cf36f0a4894771ca9d23b2b

  • SSDEEP

    3072:Tq2UvckSVtQC3/xteR1caD2jDu7CyVY/5AB+NUxVlZWzu0ZJxh2Q9mhpx0D:9U0VVP5kHtEDgqBAeMAu0ZJxhfkz0

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2384
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1794cdd710d6b7ba8b1b60f9ea7afcc9.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FEB8.577

    Filesize

    597B

    MD5

    a01fcddc349065959294cc3a59259873

    SHA1

    bb16b1279c74d3164cbc0b7a2215bbc770eca7d1

    SHA256

    8ea5e4d20f571d3b6e9fc6445b06285f75f5f1d12bf152be9b4771e3091bfaef

    SHA512

    f4ab57f18859eec6caf748c2755eb14e214c7c570af8ac4edeb6e9d60d8dbf09544d634812dfef6d4b9e0e4665cc6407dcd266d6a3c57807ad3f504e10e9a914

  • C:\Users\Admin\AppData\Roaming\FEB8.577

    Filesize

    1KB

    MD5

    1078d0bc366da6ad8ef4bc651d061bc5

    SHA1

    97223f089c879295f604296baaf53952a7ca1164

    SHA256

    03f69dfd71b13387067ba5b98c736b8c45210c65da159d43b556722f3697f338

    SHA512

    bc5a7cf94cd98e00f32245cf5a8994132272521665c539c0833c3522531dfe99bf62f26c7cf4d3d5831d4978adfa10029e021f2daf426450e3d1c66bfbfcbd25

  • C:\Users\Admin\AppData\Roaming\FEB8.577

    Filesize

    897B

    MD5

    a56a09ab355933012f73eced7c66230e

    SHA1

    71ab3f7fd700f050a1f598f3297eceb84ad8be36

    SHA256

    5d38bc174733aae891b60d6c729f0952b797ffb1d6480796fd98d9a5cd6ba1d3

    SHA512

    3edaf4568c84437986761954a21aa95ce6a7c827ad0941c33c25956f3fd92a812826e894efd09c13651c656327c194275435ba5a6b9161a0bf9e1c4b5e2dac32

  • C:\Users\Admin\AppData\Roaming\FEB8.577

    Filesize

    1KB

    MD5

    cccf86dea4fedeaedba0866273925781

    SHA1

    07015b402a9fd6df5b49c1dcbbfd684d6d23b4f8

    SHA256

    f809350a8b4bbc1ac1b0795cd0fef6314862692e575fa5a1522cd65e700f88a1

    SHA512

    15cb2c1a50c1bc4a0e85595536287075aa31a9bd4d8e02bef1e00e646956a23ae2cc9e012631631056249d23ccd9e892d5448b796854c5d263b84e331537b7bb

  • memory/1916-1-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1916-2-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1916-201-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1916-20-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1916-90-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2024-92-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2024-93-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2384-9-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2384-7-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2384-8-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB