Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 03:58

General

  • Target

    JaffaCakes118_20460809f2608eacd737b850a0e44410.exe

  • Size

    186KB

  • MD5

    20460809f2608eacd737b850a0e44410

  • SHA1

    6744a7798c23c3deb2df6922556cb4e519986dfa

  • SHA256

    66a81de263d39c6e6c435df1b9ed54bbd7567fb949fef98c3d071f9f171e960e

  • SHA512

    10e64282441f652f97b584c299957a820a25e797e104cac0b3f719708912adecd8441db8dcaee557b175bdec2c099e30d7201cbfac2bf198f33c73c7e4385bf4

  • SSDEEP

    3072:cXqjA7PrysZG9h9cBO3klmMU5+RHGKPS3MNlJ1mfjNgHC0q8Tkm4:jjiTys+h9V3QU5+1mrNp0lTF

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1972
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20460809f2608eacd737b850a0e44410.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\A5AC.4EC

    Filesize

    1KB

    MD5

    63fba2b3747b846013d4238b03c88078

    SHA1

    9cab838c8805006c631b831c50c8bdc44f28f39c

    SHA256

    38e5206c06f3fc8cbb5611eebb0cef45aa0f05fdd4fbc106bb58fe8cd0832ad0

    SHA512

    3683ce752798145dac954496dafd4547472a5b1e5789d1c41f359c690e78eec912eb277d672b6349301a454ea55f374867cb89523b8e2c58d9122c222d2d6671

  • C:\Users\Admin\AppData\Roaming\A5AC.4EC

    Filesize

    600B

    MD5

    81aa34a82b44d8f88e346f4c13593dfb

    SHA1

    cc362641eae1956d7fb42f227d65b7c68c6d97c6

    SHA256

    326ab217229b38beaa2c2827e5301d0bc0a58cee87d741740ecdad9d79c8b983

    SHA512

    7b243fdb6c911e8c5b7fe5ae2d58b7a816415f2767f62b9deefae571de220f16d49c17a59f7ab4487f98ee9d75b4d9e0630bca75c27c71b73dcb7445cc2625db

  • C:\Users\Admin\AppData\Roaming\A5AC.4EC

    Filesize

    996B

    MD5

    b1b0c005f29d0e7ce6618af97bc8792a

    SHA1

    7d7b1604a477a7c9898c87202903c046b10d3ff6

    SHA256

    00b2edd47f75480186338daada385274e19f5be6c80708cd58e452b7775267ee

    SHA512

    606620a58b9cc0ca150b0ca5178d3ddd4b2aa8f3f003752fac7c1bc92c96fbdec914062d515eadd74227a6deaa430ee78105d5ca5f4a96642b072ec21cb6b06f

  • memory/1972-12-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1972-13-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2608-71-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2672-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2672-2-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2672-14-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2672-72-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2672-178-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB