Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 03:02

General

  • Target

    JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe

  • Size

    178KB

  • MD5

    34473d67fd0b8eedd313a26ae1f5f9a0

  • SHA1

    8bf27e0489a6774df30a4e72d951eee1c5fdbeff

  • SHA256

    a0587260a4dddae640878f7258e1880d6e9699598138acf2f3152383f485a5c7

  • SHA512

    1cb3f58287ba8d6d0aaa5b517f87b22c7c8f8c81b2a4bcfda58ab08103361ac8142a3ada0408275447544397086ef4b9c7d8d932d88d477c63a6eb83b6d68785

  • SSDEEP

    3072:HF8h3rEGnHZfg15j6o7ouFD5txqo5rjuv+Q3ZWTZHv7nhR1cJCd8ahjau9M17mjw:HF8rVH1C52o7lFAo5OGQ0TZusd82/9M7

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2240
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34473d67fd0b8eedd313a26ae1f5f9a0.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\CB1F.401

    Filesize

    1KB

    MD5

    b20d896d5494b9e60ebea81ba5ea0bc1

    SHA1

    080d51f4e9061c93ed0d18eb33785a696bedf65f

    SHA256

    a9f895f6045ea53bfcf826e34890603cd8e0df0aa7d8bb2da4092d8fdd589611

    SHA512

    05d5f862e1eca54e21caad686c687dc4d885359f14df3318075e2a75481b69f5c3f4c908957a6a24fe239bb23c6136b99dd36f84544970dbf11f449a755c37fd

  • C:\Users\Admin\AppData\Roaming\CB1F.401

    Filesize

    600B

    MD5

    6616639334ee9fc3a79bf7205115186a

    SHA1

    ae2a272a32370311bf5a00972deee74228bb0e1d

    SHA256

    641982aeff0872e3f8bdc1941beab1c80256c90145a543f7146c1a148392a997

    SHA512

    8256549203f59eec53e44501d59f956b7816b80cd9bbbdfaeb4b2416f405d2b9a93747fbc00cfcfb17d9c6a9d6808d53f4a624ecba94846a7b18fdbfc2f49526

  • memory/2068-76-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2068-2-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2068-175-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2068-1-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2068-16-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2240-8-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2240-77-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2240-7-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2240-5-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2504-79-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2504-80-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB