Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 00:01

General

  • Target

    JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe

  • Size

    180KB

  • MD5

    4842c8ae27f9c502819b7d42f394c951

  • SHA1

    226e043c423a6e034b7b2b7226abd0b22befa089

  • SHA256

    1971545ba21f8cac97d3bedce32dacd9b927c2350e9354b507d41a7b0cfe8ea6

  • SHA512

    c6edadf55617ce22fff8a68f15e230d5f638c5458130242826709cd925ab69142f2c5a42b1228ef3f3d254395109e3cc1a4abb30a48552d40d3da9f3f2d217ca

  • SSDEEP

    3072:mbBSuGE8WzfzV6blPg1FrFJcYxS+WozLPleMCwtfhlAPw9dwfi0D:MGERHVNDFGYx3RLPl/CwtfhlAUdwa

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe startC:\Program Files (x86)\LP\4673\9FB.exe%C:\Program Files (x86)\LP\4673
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2392
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4842c8ae27f9c502819b7d42f394c951.exe startC:\Users\Admin\AppData\Roaming\3E8DA\4FA46.exe%C:\Users\Admin\AppData\Roaming\3E8DA
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3E8DA\A5D5.E8D

    Filesize

    996B

    MD5

    816ed91432f66e96800109c15973d4ad

    SHA1

    28a3c946ccc58e41ab55971f82797ff65f53ab1b

    SHA256

    e4e32b11d0a204cac1e270f9f4c8b342d10968a9e5ab9e90bc7629c9ca87b841

    SHA512

    41b56e25a393b758f7e3a25c9cc2bc4033f96277593a21776033f9bfda70d6b67ab216b6b40953ce6aa4e3da98c560a9c85b3412ca09032d641bdbdbe1207404

  • C:\Users\Admin\AppData\Roaming\3E8DA\A5D5.E8D

    Filesize

    600B

    MD5

    a47aa983190034306573b2f8d3561ec3

    SHA1

    24a7b4d8e9b5dad073b8a8693dcec82d0219b6c8

    SHA256

    185c990fbc7efd049fa73f2a1d9c2e0c9c9da4c7dc707fb07703623c0597a65f

    SHA512

    62000240988ac95cb0092d63056f159ee4177c5965f28368e9c8be86b3242aa0de529ca77cac953e3a73ed926bc1c3c6a409ff5166f6be82eb593362143eee87

  • C:\Users\Admin\AppData\Roaming\3E8DA\A5D5.E8D

    Filesize

    1KB

    MD5

    e5f2f175b6595a478ddb1613109fdef9

    SHA1

    240e579a87c0438fd48043f28c5588879c283570

    SHA256

    ce8ef62cb24647147df51feca5354f9285ca97e3b8678244579029e9dfc2a531

    SHA512

    0e5a487d2d5d53e26a6838b404ba9c0e9eeac0117df32f30279b133a8a40b2702b75c3aca1b1f04e2fe37177104539281e56706b3daa25a229e573e2a64f5135

  • memory/1968-126-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2392-11-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2488-0-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2488-12-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2488-297-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB