Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 06:24

General

  • Target

    JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe

  • Size

    178KB

  • MD5

    231c813d12836c2870d58d3cc88c7efa

  • SHA1

    74f3f77519e563513369c6bfd73fd687ebac3ee0

  • SHA256

    21a00430dc7b2ecf702b16f52227f7d558e9397b0d0e5f263416502c289ca3a0

  • SHA512

    51a42872c84db394dd3ce8ecfe9ea8d68507a0970f0fcc967b35c1c7eb030b81737f60d61ca89ae1550e8ca4d6c4a2b5c28670d27604ffd0426b3ba49885ee30

  • SSDEEP

    3072:/L/wyNqSMLufKePcPRD5kFR+rUr1YdDrgXvftX48yr2goxiX:/L/wXLufDwIR6d/gXHtXJm5R

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe startC:\Program Files (x86)\LP\5E1A\424.exe%C:\Program Files (x86)\LP\5E1A
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2264
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_231c813d12836c2870d58d3cc88c7efa.exe startC:\Users\Admin\AppData\Roaming\A2164\AAF5E.exe%C:\Users\Admin\AppData\Roaming\A2164
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\A2164\4F73.216

    Filesize

    996B

    MD5

    73d863fe613c23075dbeb64aa851515e

    SHA1

    45a5a0b64360b3a4fa6ea20f68b235087d00f312

    SHA256

    4d07c4a47d74f5e0d5b6d2d78a58df2e6184b77b65565230da1a3b0cf21760ae

    SHA512

    cab70d0f74af3f2661e75bd48c03d153c4f89ea24b298e575a92e2e82fcf272f6b14bbd683534eaf07c8defe614a1220bf055526ae8c0d82a35ce4fea5f34ba7

  • C:\Users\Admin\AppData\Roaming\A2164\4F73.216

    Filesize

    600B

    MD5

    d4f5a181c76f4c4c48d2eca1fdf191cb

    SHA1

    6a9ab6d98a95bb864e71966346b443f1e4a5370b

    SHA256

    c4c5c932d4e0f9cd3d3964ef6da849cf7af1ef505b5edcbd74fb4d92b5cfe258

    SHA512

    1cf9de5e3d1644f33c2f68f61570628af5e5b7a00e3328d910aaace3edd1d2f85138b476b62f95ceb16bd41b879442af1b47a3eef66d2418e39c7bafb803e3ea

  • C:\Users\Admin\AppData\Roaming\A2164\4F73.216

    Filesize

    1KB

    MD5

    dcba6633f4a1e256b770dc39d0e24441

    SHA1

    1a0d7096d758dc63448dae42030d9aaee1967e16

    SHA256

    03b46487eff245617ce262a2e29b4c09df81dcbbd3f5b79346f1263f43d01f96

    SHA512

    9209c26d82ecf74e2688523b2e9866530175d8a8ce18e72a9d3e9e0e5972b83dae449b163b7a800d9a0bc37bd3612b3847a9f3a87b011da59240bcffbc816a10

  • memory/1080-125-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1080-124-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2264-12-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2264-13-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2264-11-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2284-15-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2284-14-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2284-1-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2284-2-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2284-300-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB