Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 10:14

General

  • Target

    JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe

  • Size

    186KB

  • MD5

    3b47e68af9c013c802c90b642f9550e8

  • SHA1

    351f773a58ce9e6f77a7b9800f8799fd4f291a28

  • SHA256

    155af7464372dfda614f0a840ce020d113b82193ed6269e05ffc169da6c10626

  • SHA512

    27c62b9e557a7ed57c35cbe39a5ff8a5566206e223cf416d8aa563e0189b9a1fab2787ddf63a3f0281f6c1b2241d2e496389ca823cd798544d015f86b3b786d5

  • SSDEEP

    3072:rLGJRkDBOxGI3Y7FGBjMu80ND0y44eRK0p/WthgL/onpml9aMejt8NW/KO169Pnf:rLGTkVOP3GFilDaR7BWDgL/Q4Tit8NWK

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Program Files (x86)\LP\26FD\C98.exe%C:\Program Files (x86)\LP\26FD
      2⤵
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Users\Admin\AppData\Roaming\D7F81\DC526.exe%C:\Users\Admin\AppData\Roaming\D7F81
        2⤵
          PID:2848

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\D7F81\1BDC.7F8

        Filesize

        696B

        MD5

        56c2ec621b2bf58bd2e138ce15ea9de0

        SHA1

        6d61054b51d1beadfd22fe2dad2478c0e9805f36

        SHA256

        0a91e07998fb92c907d6ceb239d843195ac4b848e52a7b9d52ed329c66b2a983

        SHA512

        b7c25364677825c4612158f3b455ad9a0cd73fb66a1f2110419803ad578540fea348daa2bb89db248217e3f3233c8a6a284c04ce4cf45118f03394769917abc8

      • C:\Users\Admin\AppData\Roaming\D7F81\1BDC.7F8

        Filesize

        300B

        MD5

        ff0223cc604b9d0876b267339d78219f

        SHA1

        4a3955e65a0d0cda98b311f8d95b7dfc6bd91827

        SHA256

        ab72ed74f8b0b065be2d2f4a805ee78ee89fe71d7a196a239f7cfd4b80263ab1

        SHA512

        042a8b8c7c417824cf39e4ac5cd13cb73988aa8f28cf4b4e30cbe7d3720ae7db9d0ac4ce4aeccbae14ef28eba6ad7f33eef6bac64e3ff46afa87e8774ffc01ae

      • C:\Users\Admin\AppData\Roaming\D7F81\1BDC.7F8

        Filesize

        1KB

        MD5

        0052be51884f951c80e78ad45fcd14c3

        SHA1

        38abc15934923c8faab1749b5555b970ad53cc22

        SHA256

        db10735bd17730b5c976c5a1ea17116d6360e3e3851731b43bfc550b37b76b9e

        SHA512

        ed2ea505ffe159f8eeac3e4b9bc04cb9f251ebfa49549a6f160f474b8eed6d23a327861a6f9fcc9c9cdc53b051343748b303b33c7fc424d620ca8c842efd01a7

      • memory/1716-1-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/1716-2-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/1716-11-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/1716-12-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/1716-292-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2648-8-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2648-7-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2648-10-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2848-113-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB