Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 00:50

General

  • Target

    JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe

  • Size

    166KB

  • MD5

    1c8f3ac2263bb7f996ee7685ed3d84e4

  • SHA1

    bbe0e7a306b021674dde855ae3abb18ecf7c421d

  • SHA256

    4e62c11c9b8197de0d44869bb9710576341fe37301e931c4b8da665961652c4f

  • SHA512

    97c4d4876b068c404ef0b8f4bc1d55fe3523f25805c16fb075bd42faa834a85cc867a033d0dd6cd6bdc0ea742ed38c7b1ec6d88a32279d11747cf471e3f2ba0f

  • SSDEEP

    3072:vufEwW90LLrjzeNaDaW1S2XyabQNPxPHtHTk8cRB:2sF0eJW1rNbuFA8oB

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4200
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\E19E.E7A

    Filesize

    1KB

    MD5

    a2eb43a494f4b0136bdcf1948b05ca39

    SHA1

    170f7395a92b032526e482c0cd28b022c8b5f39f

    SHA256

    d58451449cb411a057b7ed3fa6484d1d01e2a8dff77b634b981cd477f07778bf

    SHA512

    6d26bd4547714738082d64a7a555fd0f01ba27e21ecff7074b8f1dd226dff603e10acff364cec74c7bbf0089c0a659fa63035081ac60d297ee0f4d00b9168a17

  • C:\Users\Admin\AppData\Roaming\E19E.E7A

    Filesize

    600B

    MD5

    0bdfa128762e58a4de3a6db642a56849

    SHA1

    ac57285cfa1456f9258081e68cdc0b7572031958

    SHA256

    76be5c72c3c112d7db244560577832a2548d80748605dac001c2d0197e19b22b

    SHA512

    329d19b410cc2b26644471c90fca2dfff155b28aec8705d6c9e6b7ec844cccee840d02a1395622462e96b6b75a18e708fc62529321f4f893e1726af3c94e5af8

  • C:\Users\Admin\AppData\Roaming\E19E.E7A

    Filesize

    996B

    MD5

    4db5f971295c69ad9621b71595785e43

    SHA1

    dd4bfd98d465b6fd5286bf0f99aa720e9e6d6cb2

    SHA256

    a5001cd97297cd4f603263182ac4a4813aefcbec52d682f6a1902680fb548cad

    SHA512

    e6674c48b7d8e373df353c7bf069539e882f1e3b4bf46c70e0be35e5ebd6813c0a9bd6593f943b162cf9585384baf9e84a6029817d2a93c499b1df957ea7d2bf

  • memory/548-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/548-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/548-15-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/548-66-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/548-173-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4200-12-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4200-14-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4844-68-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4844-69-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB