Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 20:30

General

  • Target

    JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe

  • Size

    161KB

  • MD5

    44d76a8755e23030c5594366efc323e6

  • SHA1

    ef591b1959c1387d4c08957f3b832a6cace66938

  • SHA256

    4e78b2fae539e3e9ed7fc2b755be1b590c3dc2891ee7011a44f8fbf23e6ec2d1

  • SHA512

    29cc520d2da1a179ed84fcbbd82477903957d39e181422916a8dff77bdb35cb201112b54c28058c98192bc3621ad6a0e8f0c2e2418151c6d1a1e4562a25e03c7

  • SSDEEP

    3072:kojx9B/pFtWUL2bICrLBT48/KQ3gr81sRUTYa0BkZg9EzpAdSuPY32nVutG1lZNv:koV9B/pFtWi2bICrLBs8/KQK/ZzkWezm

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2288
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44d76a8755e23030c5594366efc323e6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2493.683

    Filesize

    1KB

    MD5

    637bf43325ceafa1e8da07bf8b8d30ee

    SHA1

    a251324b7ed1bd01f753d4471c9c47cba8809310

    SHA256

    69fd9d0fe28e251c80277c7f96fd90e996d6103e90604397e5d58f75432e5813

    SHA512

    0c7058ebe8d29870c255885400acd5ee6fa0e4284e5d3202aaaa3906dc1992743417606a785f049b3a68b537df5f2d5ca4a70ee61a325a948ee95b7c7be08385

  • C:\Users\Admin\AppData\Roaming\2493.683

    Filesize

    600B

    MD5

    7e87dc7dae4bb7de7c30a9ac5b52953e

    SHA1

    880e9867afdfd193b50a86f96baf170a8c3d5e1c

    SHA256

    490d7518f503edf094228ecc7645498cf8e61a7817a43fc6ac69071417359ea9

    SHA512

    a5112c4ef11c364d0859fa84f9a85dfdb274215268113eef579fefe842112850e602b07fa6467bed4171833872389f45ee6b0e1da29443f2459d7e40e32f9fa9

  • C:\Users\Admin\AppData\Roaming\2493.683

    Filesize

    996B

    MD5

    7c0f091b828c4e136ef38e8b0e90b38d

    SHA1

    d049b7c45c1006318556b9e0212078f85313a46a

    SHA256

    4d38dbe5b3e0069dd6d4e57e58ceb58963d4f03aed730d9477b6b9a7b0487d19

    SHA512

    72399e3ee9a2e1e0c4ba1bbe06dc1473838881ed693688c935226051f3270e7873fb35198c29b515404f7858ea793d762bb40b1877b8bc8a36c57af0d489b907

  • memory/1960-88-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2288-5-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2288-8-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2288-6-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2848-1-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2848-2-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2848-16-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2848-89-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB