Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 17:54

General

  • Target

    JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe

  • Size

    166KB

  • MD5

    41f7f2200cf39489f99f82ef1ab727d7

  • SHA1

    c6af8c603910a3c6edd5600ff0d849c6d169cd23

  • SHA256

    2c18b47588f93746be9eb64908defaef48fc3bee1cd06cf9b05c0887cc3d62c6

  • SHA512

    68ae4c8c92800bfc8cd7eaf1801d9ea408f3932cdee4d909ddaeef2cdbfa7c9436e13d6b077a21eccaddb08fe453476f19fce79e11c6996e9434a1c1960e5ac7

  • SSDEEP

    3072:Tqx0uMqX1Lkhk7CcjCcwikH2Z3YCx8gl7KFSAo1KUDRXiweGtGK7QmT:TqxgqX1LkhktfhkWAgpESAoKeRXiOR7T

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe startC:\Program Files (x86)\LP\8E31\D5A.exe%C:\Program Files (x86)\LP\8E31
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2512
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f7f2200cf39489f99f82ef1ab727d7.exe startC:\Program Files (x86)\554AE\lvvm.exe%C:\Program Files (x86)\554AE
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\1D655\54AE.D65

    Filesize

    996B

    MD5

    127dbc1c4d4814d8a1a4648b6bd30e50

    SHA1

    eaa398d0d9dfceb388b7fdb1694026197021f4e0

    SHA256

    b99ff5367f13753ad0373a24434d53e85d3d8bbaba2963daf58e07d10aada8e5

    SHA512

    8af46eac685fc7834e6d28e58face4b3549ea548e77525093a00a7bf81e9f0c4c65d80457bee3bb8a8cd0bdec30c206b618f14dc8b259a0d515e5bd9ad02f0ee

  • C:\Users\Admin\AppData\Roaming\1D655\54AE.D65

    Filesize

    600B

    MD5

    e449197c7f8744f9b693c85c2596a930

    SHA1

    023998c33a8f780945332f249f53914248fc022f

    SHA256

    16c886caec9814227842724ac10060172233519cbfb3f009109d060554f953b3

    SHA512

    2bbea183e1eacb67496e0812b09a6e8ff2da76f4bfaa7772d75fbac2547826c78efbc3145ca754ab3a3ea7cc013e8f71a53b8328116636305d2b5e34af86da81

  • C:\Users\Admin\AppData\Roaming\1D655\54AE.D65

    Filesize

    1KB

    MD5

    21c207a026bb3d40cd49c77d9e1cf27d

    SHA1

    1b02f2e940fc4c6a5b55020091ed3df4a3f037d0

    SHA256

    b1b19cff45f309a654874d6d44a2dbea72b4932db7e566aac24b8cd064252119

    SHA512

    13ec9b759f716a41b70680d1480ce082f24ea16004e8bd11297011238d3df47647a8dcaf4eb97c93f6045b78b77d32961b4657d08be40f78827f3e4c532d1b25

  • memory/1752-119-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1752-2-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/1752-3-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1752-0-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1752-269-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1752-18-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1752-19-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2512-14-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2512-16-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2512-17-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2804-118-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB