Analysis

  • max time kernel
    140s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 08:23

General

  • Target

    JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe

  • Size

    176KB

  • MD5

    25a1d513256a4c22796c8757b498526b

  • SHA1

    106854a11fb6694197cb41140b0d235511194d0d

  • SHA256

    ab30a0ba23aa61cfcefa3c86b23d84b5a09be3d2920875f912ac7b64fcfe2324

  • SHA512

    9e2f1353b2c049be39006a11105648e20c1b9a75714cfe2bddfdf9db9cb5e655595740bdb483515667c64adedab85e9170a57c584f1a1321b50e7726074e2c40

  • SSDEEP

    3072:IuFXluw8oIUbF6iYhSd083SmFha/MnUXM6mGemNbdHumbfEFJgWR564p+C:7Nl4oI7ZP8j6/G3pZmNbdLfEFJfC4D

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2272
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25a1d513256a4c22796c8757b498526b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\0CDD.5CC

    Filesize

    1KB

    MD5

    92525334473f832054c6a80cafe5a969

    SHA1

    f5dc0df9c2eaa6d19168c66bb1a5058e861401f5

    SHA256

    424af2249d1478ecf5b5e26ae551450c56a8bc444933845b0604f41f1aa2ce08

    SHA512

    85647c3db36cd19c60d746e51b263f1d7a4213e885b1a79b009c83d30f7f36160977cd8b6f3e4b54b669c9cfc215033a53ad80bdc821ef15cd7b1d33a33cb829

  • C:\Users\Admin\AppData\Roaming\0CDD.5CC

    Filesize

    600B

    MD5

    279576145d00ecea37ba07f3d7da84b2

    SHA1

    fbe35fea2d6838cf6ba82cc3e9ad9f9905fe9857

    SHA256

    f0e5146547fac69cb3f3d36f3bb281c8225fdad552f1fbbfa706a69e2f0492a4

    SHA512

    91f3d61c1da4c79f65d2ef699d3703cd357b36ef833560a35644f9ea874e3fde065786b835efeeb872061d9619712720029cedd9e6f2de239b90cb5ebf1b43e8

  • C:\Users\Admin\AppData\Roaming\0CDD.5CC

    Filesize

    996B

    MD5

    e56425f91bd1e2561ec9d74a9198d92c

    SHA1

    c3877e6a82af115c5512540a331d8c675572e1f0

    SHA256

    290661a590ace3cf96424a96591af178bcc47a1e5162577cc183fa9d549968b5

    SHA512

    74a538bc1125da1224a49d27f8894ca80053909993aec2e92d9e029cc639f5aa6e54d408159dd40cefc9205e2a855834d4b4137c0428555926f7ee4a1b747b6e

  • memory/2124-1-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-2-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-15-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-184-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2184-84-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2184-85-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2272-6-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2272-5-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2272-7-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB