Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 10:14

General

  • Target

    JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe

  • Size

    186KB

  • MD5

    3b47e68af9c013c802c90b642f9550e8

  • SHA1

    351f773a58ce9e6f77a7b9800f8799fd4f291a28

  • SHA256

    155af7464372dfda614f0a840ce020d113b82193ed6269e05ffc169da6c10626

  • SHA512

    27c62b9e557a7ed57c35cbe39a5ff8a5566206e223cf416d8aa563e0189b9a1fab2787ddf63a3f0281f6c1b2241d2e496389ca823cd798544d015f86b3b786d5

  • SSDEEP

    3072:rLGJRkDBOxGI3Y7FGBjMu80ND0y44eRK0p/WthgL/onpml9aMejt8NW/KO169Pnf:rLGTkVOP3GFilDaR7BWDgL/Q4Tit8NWK

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Program Files (x86)\LP\F0B6\5FB.exe%C:\Program Files (x86)\LP\F0B6
      2⤵
        PID:3964
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b47e68af9c013c802c90b642f9550e8.exe startC:\Users\Admin\AppData\Roaming\6DCEC\447F0.exe%C:\Users\Admin\AppData\Roaming\6DCEC
        2⤵
          PID:1364

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\6DCEC\C766.DCE

        Filesize

        696B

        MD5

        42d897108f0969adce82ff8100f71b5b

        SHA1

        e6e0546826a445ddd68c8b2f20e09b8fa085630a

        SHA256

        d22577e342f066ab8e92037cc8158ecf5bbbf8a22e351c322e2a00c5fa1aaf21

        SHA512

        1a02e9119262db425b8cfe462987b09c69299e6e1a233d5a0dab2dda6dd97848a719d5d285046d294670e98b7e93c10d4369d3b5ad40830648a07f9f21699e83

      • C:\Users\Admin\AppData\Roaming\6DCEC\C766.DCE

        Filesize

        300B

        MD5

        d4c2d0f37239c923befb98ea13eac376

        SHA1

        b385c2b271d354f06c739e9f8afbe7fa5187dad1

        SHA256

        a4b7d70c693901e089c44c0f74f248e722c0a172a10c940f62f56be500ed548e

        SHA512

        8a357472bb4e241c2d8872062c2fc087d07c37bff8e896456e9241b1f9d5ad8f022d49117ab07e5666bad4fb1b8de43e2d9e5edf3ed7f2b2020681c1477f64d9

      • C:\Users\Admin\AppData\Roaming\6DCEC\C766.DCE

        Filesize

        1KB

        MD5

        97f1f66f2e077e89e595a2947c958e38

        SHA1

        2d7f1012257ed08a7a0a202197ebafc539b51548

        SHA256

        df16de923a083b841227f9018102d1512a52c22c40e6f31be5d1f20d1bec3ece

        SHA512

        d7b92d27aae06e72bc6675b5599685b84e8ac9c77bc41a16038fc6af0ad64c3f2f3ad4336b25b5466b41a2514bf8ff74b8d3c43bfa01b763535d1c4c36512dea

      • memory/1364-115-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/1364-113-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3964-8-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3964-10-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3964-7-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4524-12-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4524-11-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4524-1-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4524-2-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4524-282-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB