Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 13:46

General

  • Target

    JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe

  • Size

    179KB

  • MD5

    3e3fdd5c9eba65c58d45acf822b16b87

  • SHA1

    616a4735529406aa7e47c17799ec2b84ec6bc23c

  • SHA256

    1213557ca68812da445c3e1d7caeb68c1219bb7cfaa31db9e6e80c1380592fbe

  • SHA512

    4613abbf1865dbf71eeb4359d23cca0883e5c6dcfcabf6b97356d53753ded64b6abd71530ed156b7f4c8ca26f8b83ef0da2da3ff19b5ca6997a8723616166761

  • SSDEEP

    3072:JFVYMk5EvtCgERIsquXZ1iy7LiJQ+gIod7q1SJJmfVDfmcqvXqRu8a3:U+VeWE7r+gIohqQJg4cqPWM

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe startC:\Program Files (x86)\LP\D04A\F88.exe%C:\Program Files (x86)\LP\D04A
      2⤵
        PID:1712
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3fdd5c9eba65c58d45acf822b16b87.exe startC:\Users\Admin\AppData\Roaming\A7630\6F8D0.exe%C:\Users\Admin\AppData\Roaming\A7630
        2⤵
          PID:4572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\A7630\09CA.763

        Filesize

        597B

        MD5

        7f9e8f7198f5808e2ec86ddec99f9348

        SHA1

        e30eab6754822c1b0e8bb637462eac76617cd95c

        SHA256

        0699287772cc07253711c5e77d6038c29df6e36907398dddf4e6bbe0b8128873

        SHA512

        9ef95a709692da1e69e1b3757f7e21bc2fe2df1e834eae7bb99392521b191380a7371e71ec4d3596eaa467ac9b47936909edc3efa187bcdec0628ff24f10b401

      • C:\Users\Admin\AppData\Roaming\A7630\09CA.763

        Filesize

        1KB

        MD5

        4d20ee21715a686b05b2b17592b66987

        SHA1

        8a97a5e64962ff02bce33cb87ab9221cae9bf952

        SHA256

        814cd26cb489110dd8a29658ccfbe87d4897c64867cd1f7afdb2b8aad29e64a9

        SHA512

        6b86311c5412fa215d9141897128447810a967cbde0e921590d4d00ac890221065078b79fa5f3735935c94babf1a7507114a318a53ba88fa1f01b5c83cd7e778

      • C:\Users\Admin\AppData\Roaming\A7630\09CA.763

        Filesize

        897B

        MD5

        37ecef10841f4764b3cfaea07c471a21

        SHA1

        3825b0d022e48b34d069d4e283790993eeb071ec

        SHA256

        8f3c90813466c53e75bc344772d21c90ae15a54bff5957855a4ee25b60c84ca1

        SHA512

        eba5e42c8608f8a49d4dbf9012a4060078178d717b6d7c78e96ad74a350f4298bb691e6c3aab92fb962044169ea3f439d4a7c8fc6405be0b400c64a49f93e623

      • C:\Users\Admin\AppData\Roaming\A7630\09CA.763

        Filesize

        1KB

        MD5

        bffcb0d170a565e875989da7643f55f6

        SHA1

        ba4a41e2e95f80a1136019d6bbc1f0948cccbf65

        SHA256

        414d44ff68007bf81e90fe3aeeaae0f191f61ce5a7834b0ca2df240a4127a436

        SHA512

        7d85700c3253a92456220752c9993d3bc323411f3bf57c6bc5a1b2bf81f8268b783a5a857fb65334d0e179d329975737cb154c47842d2d48f912948d3f96a49d

      • memory/1712-18-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1712-19-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4152-20-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4152-21-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4152-0-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4152-3-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4152-2-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4152-270-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4572-131-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB