Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 01:03

General

  • Target

    JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe

  • Size

    183KB

  • MD5

    668c1ff3722c38ed44be150edc679a30

  • SHA1

    3cc40e80144b2972a10043d1cb799cc1dfad30be

  • SHA256

    75609dded5b09da047053ec8f8481c0de75f0656ab24bed8d32820fe6a90863a

  • SHA512

    e60696f389847b94b9b060814b82b3fec9b0db0bf472306e461a66ad691f036f68dd0254213aa52dfba51a0d29e3ec1330a1ec2203da6763f377df0c0d43a121

  • SSDEEP

    3072:7qjd/dUiDkMtUfGoLQG2C0hONqvgEpRIHS3ZkEXWErUxG+Tgv49AiB5EWoybQcBm:ejdVUraUeoU/lhOeRnNXWbxG+TgvhU5U

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2880
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_668c1ff3722c38ed44be150edc679a30.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\F577.0B2

    Filesize

    1KB

    MD5

    61b7f4327d360c44fa0da5e6db9d2e66

    SHA1

    99d0a94f84e588b4885a366ff7c08a4b049eb8c8

    SHA256

    094bebecb751ee9962acc5efec1eb42094d116812e8d8061cbb25a94aa569d9f

    SHA512

    8ca65e249b7d970c3b96a7d80554df24ce3fa95512f8a4821b24f258597d6ab5dc4ce34f2356f4634418c40a3dca180a12f64e7d08d6fd602ab6f29dd46768d4

  • C:\Users\Admin\AppData\Roaming\F577.0B2

    Filesize

    897B

    MD5

    7398868bde76846bc6c1c3861af2d994

    SHA1

    882a218c7fdb8cfc773bda0b70ad2b1bcd3905dd

    SHA256

    a7fcf41de82136fe134eaf1d2f7694eb451f91d6d85001b7e91e6bcbd9281a09

    SHA512

    47200d84689c6c4531489a232988eef384fc9963363d52ff95120cbb1037a6f80ac48a66c4083792ad3294a7971da172bfb137a88850c75727b68a1ef451649f

  • C:\Users\Admin\AppData\Roaming\F577.0B2

    Filesize

    1KB

    MD5

    ec21d70b5f70800781a51cea127af094

    SHA1

    9aae14c5ff57de58f43f897f1948269b5d6d0186

    SHA256

    0d366cdeb269147866c5b8e04712d7fb4987153cff5b9984d491ac39aba5c41a

    SHA512

    f57dd8dd538f4d7c91a3dbfc701c86b4acdc6eb6dbb86593821a2bdbf8885a0a8cdbc2fb174f274fa084f1c8970041c581d3af14f157925bb642baa1fc863cd2

  • memory/2564-82-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2880-6-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2880-7-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2880-8-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/3032-1-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/3032-2-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/3032-18-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/3032-83-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/3032-175-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB