Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 12:59

General

  • Target

    JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe

  • Size

    187KB

  • MD5

    5790b8365cafa2868f4fe4af4b90ed21

  • SHA1

    52c2f9a4aef7bf8b7d700c631b148b14cbef59a6

  • SHA256

    4e13b1d5ab5234f228658e47f7d02be93a172e01483bcc27c041516fd128b354

  • SHA512

    1a58acc5f58fb233eefcc670a808b4284cb2d479312ed6557f32b6421b8d8e9cc3c8ed031c1252af3adf651667073e7d5d152dac532f884701136895752c67d9

  • SSDEEP

    3072:7O/Rpeq71qplZ2+0wk3ilnB68X0YRNfBRdlQH03+7DFNEbS6LjamDlL6WS:7O/R9clZ2kiqNBRNfB5SPFSS63a8u

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe startC:\Program Files (x86)\Internet Explorer\D3AC\6C8.exe%C:\Program Files (x86)\Internet Explorer\D3AC
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2152
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5790b8365cafa2868f4fe4af4b90ed21.exe startC:\Users\Admin\AppData\Roaming\C6A40\83ED3.exe%C:\Users\Admin\AppData\Roaming\C6A40
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\C6A40\0A5D.6A4

    Filesize

    600B

    MD5

    31401966a80eb3a47f79956c488de7de

    SHA1

    262cf7b2e2f51f2bc4e59ab9be1fc603eb7ce9bf

    SHA256

    f5bf851fb491a1ffc11d4658a3d0a7e169aa48a4a89196e74bb5477a8e25cb16

    SHA512

    2967ac6bdf38f42a4326ce49d7aae187095e8f9c10ec7d8281f42fda791fb5a55dbfc9aede8c957c53d6fb64c9cd094e7666fa9e38f9706e1f3787ac5d5bd5ae

  • C:\Users\Admin\AppData\Roaming\C6A40\0A5D.6A4

    Filesize

    1KB

    MD5

    a20e3a5bb0ec7221b2644f8a4a428ac8

    SHA1

    ebdd469aa7bee2365e9438761242566b6be59001

    SHA256

    4e777da4c52a85841d290e731098e4f8022f879443c0bb10f463010c199a96ac

    SHA512

    7c86934b750c2c5c73867a89e2f867af0da85ce3272782e0ab8d5d6fca6086e51bc352ed170f6bcc610f5dfd5e5430f9108c3c6395e1c19b2a192d4fea8e5cae

  • C:\Users\Admin\AppData\Roaming\C6A40\0A5D.6A4

    Filesize

    996B

    MD5

    939b60fe8d887d9f012a10fe16315827

    SHA1

    ee8dba78bcbfa8bcbafcb5aa10de85e17d46739a

    SHA256

    d70c3871324b171db2ba2f535ccb4ab17fc8296af9654df9abc76a41373be49a

    SHA512

    d86bc70a961b1fdd5612b749faddb6f207fe587023c125d01a815e359cf3f1f9a15249518f2c97c35795392bf31001bb3c06d9efc198f38bd61dee9ddffb6346

  • memory/1620-1-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1620-2-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1620-12-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1620-192-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2152-11-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2652-79-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2652-81-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB