Analysis

  • max time kernel
    141s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 16:00

General

  • Target

    JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe

  • Size

    177KB

  • MD5

    5b9142d6316eb42620f9c0a51d58e99a

  • SHA1

    419d6d02b650d0a57b5c3a37a4abb7c6553c1363

  • SHA256

    2e07ec34fa646659226d4b004bdadc0da6f462e8d69cb88607b157b52cc32d6d

  • SHA512

    76c7996aa7f5219423da232c862586a311c106fd7f76b392bf1fd12e683417592feeb5262ec45be39bdff6d515bf579678c5cb800fa483549876f3dbd20436c8

  • SSDEEP

    3072:tRHpQhbq6/CQuMOEg2Iuqvrr4RP09xZX787esJoOErMDHqD9jh1:tRHq46qQ52uqvAR0z5Ie4y4+Dp

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe startC:\Program Files (x86)\LP\E93F\873.exe%C:\Program Files (x86)\LP\E93F
      2⤵
        PID:1452
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9142d6316eb42620f9c0a51d58e99a.exe startC:\Program Files (x86)\6C974\lvvm.exe%C:\Program Files (x86)\6C974
        2⤵
          PID:4484

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\F666C\C974.666

        Filesize

        996B

        MD5

        a228084a4e0d111a6fad74df0c7f2747

        SHA1

        5b94e36d5907c670f520af4a681f6e0b7c6a1574

        SHA256

        47cb0ac17db20e44e2ca2c07b689ef3567b98c692ef350ce489c44ed12edd66a

        SHA512

        0989ef648e0e6b3896a3d66dcd2773c7e609a54315384191718f908953c52a7ccfec8a47376a0ff924f937a14baca782bae67b4954a7197ed17ef8a2c2e170ae

      • C:\Users\Admin\AppData\Roaming\F666C\C974.666

        Filesize

        600B

        MD5

        6a9e81f3f8e369dd7f41070f276e8798

        SHA1

        233fbed05a791ce6c74382d3352958e71a2c59b7

        SHA256

        9070d09f9e0a2e728fb3595f43ebe76a9c09669523dd4dad3fb6566eb6f1e78c

        SHA512

        1d1270a6c97d82a5055d0c7eaf30a7bab6f475529e93d8e5870cd1a4f579a09372078be990b1958b8894220ca9cf583ea01dfb5f900b3e1866153e833e9142bd

      • C:\Users\Admin\AppData\Roaming\F666C\C974.666

        Filesize

        1KB

        MD5

        c737069cc57a4d8ada38ebeea23cf5d1

        SHA1

        789fb1621867c9bdf25e32f0169bff3c35a6e099

        SHA256

        3ba17a49d8828d700c1b75f6058316e936e20bcf31d6fff717d63c489318defc

        SHA512

        aabe69d144735446b5adcc9224dd49e1025508b0b7135d1c8f0ac0cdfaaacd2aa6fc38cca17435083410da756c941fba92fd98ec2ad4c17752ee8373b8bcedff

      • memory/1452-15-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/1452-14-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/2760-17-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2760-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/2760-12-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/2760-141-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/2760-3-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/2760-2-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2760-303-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/4484-138-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/4484-139-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/4484-140-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB