Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 10:07

General

  • Target

    JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe

  • Size

    169KB

  • MD5

    3b29383007fb7037bab2fdd8fa9e34e5

  • SHA1

    01ff35d931c930fdad49f5d1057ed4bf36905744

  • SHA256

    17c875fb6b85948075d5be4f6f887780fd1a28d901174b3a96a43bd478f2b738

  • SHA512

    42ee6c866a609869c01682e17b221de5a3968e37ad0fa80afa202aa3bff6184227d07424993536b257a44c5b6736fcff11253f87bfb32ddaea9e8e5c7df574f1

  • SSDEEP

    3072:LQ9X812u2T/BjSkLKlkyHtzuRe4xvkrBlOCkGacw2bIQ1yDGb3VAFBnpurFrNgm4:LQIEjSOe6RIWCkGx0D63uF5EZBZPiqCD

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe startC:\Program Files (x86)\LP\C884\747.exe%C:\Program Files (x86)\LP\C884
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2300
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b29383007fb7037bab2fdd8fa9e34e5.exe startC:\Program Files (x86)\17005\lvvm.exe%C:\Program Files (x86)\17005
      2⤵
      • System Location Discovery: System Language Discovery
      PID:284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\49017\7005.901

    Filesize

    1KB

    MD5

    e9bbded12b31e7dfc661968d3b891d20

    SHA1

    2cf4e6720e5d7395f79cc2dc5fd00e539c5e9a2d

    SHA256

    c1979c471c760d7247a6dd5ce28c08198dbca80e53e30280154f614f1bcebd4c

    SHA512

    4db1994f684327d632c71888bc2e9e1a34c3552e00d9eeb6448003cd43f7d673c128180c5953394e18a2a345ee95cb30d2ed82ab231bf7858dbf49cd7e4191c3

  • C:\Users\Admin\AppData\Roaming\49017\7005.901

    Filesize

    600B

    MD5

    94544c2d5309f3688a4ea2408c625d13

    SHA1

    2939a81b2588d43507b5fc2953de7a0d02e2d86b

    SHA256

    912d33dbd9447626a65d288f9b5a6b1853b38eff15666b9ec84be1ab5bde3a91

    SHA512

    b50f89e7b5a530be146e1f0f20aaaa72aa0bfff85598c19d173541a6800c193da5bd600517a6802159d2de9d29e5e35a72bbda01c5bf3dc96675482f946803d9

  • C:\Users\Admin\AppData\Roaming\49017\7005.901

    Filesize

    996B

    MD5

    d1e629eb150fb913aab92120a126b574

    SHA1

    afc05406850c9ed54de56b10a05a7cfef5de8676

    SHA256

    5c47c2ecf966cd3e57a3d8855e4bccbfe41b6a7b21a873f299a5248ef4e2a448

    SHA512

    36609a6891bbb9097c1abd772e93fcc7d57b0202385306d333a7f4c30d2df4c4839b095b25f943d27d5825fa48165c1055e57f529dca2d8d2870e26a1cd4d4a3

  • memory/284-83-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/284-82-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2300-15-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2300-14-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2300-12-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2688-17-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2688-16-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2688-80-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2688-1-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2688-2-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2688-180-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB