Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 08:12

General

  • Target

    JaffaCakes118_3958959cea06679f591c8920cbb00b9a.exe

  • Size

    177KB

  • MD5

    3958959cea06679f591c8920cbb00b9a

  • SHA1

    b3fb1c0c1d03580a8bce4ab48b566bf182b16385

  • SHA256

    101afb81cb6748091f919ecb695c4c2bf981ac9b37a7cad39de077ca4123b5cf

  • SHA512

    22701ce63dd93b38c8043e53f20ebac34e617071535e3238748dc392ccd49cc8e64691b01be5cafb42df1bfe359259298f87d6c5fec1c60fae2581a090d6d994

  • SSDEEP

    3072:st21N2N6buomS/bDoRIMmllcixB2X+ANGyyvpcXytVlSf8+CxZUO8C:sc1U4HjDoRIl7ci2+ANGFvZVlSfPCxv

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3958959cea06679f591c8920cbb00b9a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3958959cea06679f591c8920cbb00b9a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3958959cea06679f591c8920cbb00b9a.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3958959cea06679f591c8920cbb00b9a.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2252
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3958959cea06679f591c8920cbb00b9a.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3958959cea06679f591c8920cbb00b9a.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\C8EC.AB2

    Filesize

    1KB

    MD5

    a700fedd58095ba921b8f522f881f817

    SHA1

    7f866d487629b6a3b5ea18a71c1f9edb0256a404

    SHA256

    43898169deec775f623f635027348db292d7a22b6aac3642bb769155906337be

    SHA512

    1bd642959cb091c26b2044afbb4a21efe9566304d81680d4e710c87e81e6b6b8e648202521cf26da1a2c2a3c84d48704543fd42573db9c3d46296bdd5f5975b1

  • C:\Users\Admin\AppData\Roaming\C8EC.AB2

    Filesize

    600B

    MD5

    66eee3096d73dd6652b7030d006203c7

    SHA1

    7bcc853d15663f2584a04baed85bec6580631573

    SHA256

    5145c09cd495dfe6b6854a5a6ed398e690e63cae23cde19757b2406d367f2c8b

    SHA512

    bb97d8ca049f6aec4170d33579b8e29d2b39d7c972bd3b973cc4399604c98c4da42cd76b220933a607856d8eee51c7625cec11dea51afc99b8ed397b3a1c649f

  • C:\Users\Admin\AppData\Roaming\C8EC.AB2

    Filesize

    996B

    MD5

    285478901fbdbf6af17e9f2dac82260f

    SHA1

    2252a9e9d33d8d07d4fcbf12c8400c109fe11d9a

    SHA256

    2910b424d603b6606b815a706da53725ec35b174dd8036abdb8c1c41c34eec57

    SHA512

    a8e98da87936c2b94c7880ca4b163daaa7346ef4588315d00bb23b941e1ed94215f23c33353acb04ab725a948cc48be01b4e98383a41933696a40f221fe1437a

  • memory/1248-86-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1248-88-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1916-1-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1916-2-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1916-15-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1916-84-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1916-205-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2252-13-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2252-12-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB