Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 04:02

General

  • Target

    JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe

  • Size

    190KB

  • MD5

    6a644eae0b126e463cb2bc9073c6e65d

  • SHA1

    fbdad709780daff80eda4b366f8c11aed106eaea

  • SHA256

    a612deba068d9ace26485c230da9e96d5fca0eec59adb905b4bf6f005c49bb5f

  • SHA512

    8e612444fdb5ebbdbe45872817150a6398909e61d01314ec2ed3c1fd78dd1f5bf2963c6d691a3f90630b7c05667213e69c430d9338dc2e3bc443fd7847ff241c

  • SSDEEP

    3072:7OMBdOLmzQRSnw9DA5pDmwxKrZ8xWlNIFUHlKEUVsHDzh9IQQWJ/ySDm67:7OMBsmzQRkw9DSmR8wlNImHobVRxE/y2

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1492
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a644eae0b126e463cb2bc9073c6e65d.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4D7A.6FB

    Filesize

    1KB

    MD5

    210c9e73a1a3909dce7b384fee395404

    SHA1

    f3a36af7cfaa9db006fdacede260269e27b1ffbb

    SHA256

    1dec6b45ffb1543d1ee698c598f7bc9ab8748dc2c689e364526387c07193985c

    SHA512

    800ae48b4488778646ae0854cdae4d38ce78fd0e678fbc20185c7641a49fe5335447e54b14c5bde4506a6fba250b396c7931b44d43a8bb2159bc8bbb96a4509c

  • C:\Users\Admin\AppData\Roaming\4D7A.6FB

    Filesize

    600B

    MD5

    7de41ccf2fb6ff32762cc815ac32d704

    SHA1

    2842f41a7702caf6c7be9d192ad4d06727d51a79

    SHA256

    2baa3104fcf7e832fd7d2ad81568d8e610044987d0f833ba8965a7b4ab82f5bd

    SHA512

    843bd6080129e5518222ddd749ae755c93a162d1dfe16fc37aceb9e2598065f55a709948e3b26169e45dcddfaff31a8bb4e406b181c63e346ba47d9ceb9c5256

  • C:\Users\Admin\AppData\Roaming\4D7A.6FB

    Filesize

    996B

    MD5

    515562135adfb391acd7ec41504ab205

    SHA1

    844a7e966d96de3f2970431695785b7d82446e33

    SHA256

    3550e24489c2360cdd22ce0ee913e10fc100e66764f6da5b98fa8e9b6eb5661a

    SHA512

    0dfe0d68c0ee87c46d4d4446dbbe51f125572ad181e97c60ab05bb59bcd1fee055d4ee334404a489c925bd24a280617a4a9141b7087c51d2b6738153aec6301b

  • memory/1492-10-0x000000000059D000-0x00000000005BA000-memory.dmp

    Filesize

    116KB

  • memory/1492-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2056-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2056-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2056-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2056-200-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2748-77-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2748-76-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2748-78-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB