Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 04:09

General

  • Target

    JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe

  • Size

    183KB

  • MD5

    6a93bd44caa7387d8820ba4412f5ed67

  • SHA1

    24d417b6f246d3f486a44321b6cb3b2b8a6882c6

  • SHA256

    751c0ca76e4bae9f4d869d4aae22b374dffaef8f43abff58ee3e1945140c90d7

  • SHA512

    c7dd8f142d916a02bb20a18c56100689de177185bc49f50ad7dab4189fc6e48cc0eb9c8359a3d3405579d51f15bde3e247be1d5bac647d33b09e4922124bb11c

  • SSDEEP

    3072:d3rKTTJ3YQGhQTvjFtvF/57Bg+F4p8Hj7zRgu82PC6nlLkwKet4uRzSD5dYux4EO:RATqQGiTLFNFx7BhVz2J23LkwDOuOTYX

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2480
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a93bd44caa7387d8820ba4412f5ed67.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2392.4D4

    Filesize

    600B

    MD5

    e1de5c6592cf3d41c56097b8c1c0fe72

    SHA1

    d687f9c9b03ef5eeeedb2aa01255658cd8115245

    SHA256

    86298a77d5aee0b6bba194cada8789f0ed02d6b77bc433a97ce3ab5ecf1d4bdc

    SHA512

    c4d69315e4a70f2b2462623c03f1c67cd5fa4a5df002e02359965d26cf6f8271eec872dfb26475e3f7f1ba15c6ec70b268245f7bed8627d4a40e87360f39a358

  • C:\Users\Admin\AppData\Roaming\2392.4D4

    Filesize

    1KB

    MD5

    73454397f5dc7059d4d2fbd3b0680a10

    SHA1

    9ce688df3d5fb735d33b2c8f03f5e3f6de9a8a32

    SHA256

    356ab23126a26c930db8e5f6918690d39af3886d83d8b8b8afb8ff82a334426c

    SHA512

    9bcec2e8259fa6d6456edd5f9fd77aee23633771d640ea86bfc17415b7478ad9d66ce1f6863577d41a0cfeafa361335f853bb68a193ebefed8e10cc3977e502f

  • C:\Users\Admin\AppData\Roaming\2392.4D4

    Filesize

    996B

    MD5

    f4276811f12f57d98d6e0267c632803f

    SHA1

    40e22bdd947b55a96fb53c8b65207634380183f9

    SHA256

    77be75d5233e3a4d719e01140f8aad2770650a229c66c235b078d863b3530a91

    SHA512

    0f578fdfbf5e4fff2450974170b042ec294fa4561c0b97d11ba6e67e8108a1a5c2d60ca4190c27128eaa41ff43eb2eec9d6c5af9c382497da036b694dc519cc5

  • memory/1404-89-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1404-90-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2336-2-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2336-1-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2336-14-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2336-163-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2480-13-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2480-12-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB