Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 07:41

General

  • Target

    JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe

  • Size

    178KB

  • MD5

    6f885b5cf83063796df80de97896f57e

  • SHA1

    7530ea982af3ed379ff8edb75d5656a7bd437ab8

  • SHA256

    ab407357d168b1779cb6e2c9c978002c63c2708caba123f5ebc1aba99afe5cda

  • SHA512

    267896d80011eb8499a86f61983e725eb9e025453cb9280e892d19ccf085ce294b5113560fd1da28e90797ab3cf31a62106e1f97bb63f262f2ef0ce7035d7b57

  • SSDEEP

    3072:C2tNXiRKmPgTeVdH0bVr93DKkOwQm72+5/1E0J3MTpVh1zrCdDZxSx/iI:oKm8eV5eilma+5//NM9VTC1ZUB

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2340
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f885b5cf83063796df80de97896f57e.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\B8B1.942

    Filesize

    1KB

    MD5

    a8ecd1c13bf731a9037de48dcfbe38de

    SHA1

    113537cd21e34004ea4c7e48f70309ab01a08698

    SHA256

    656eafebbf75458d3d090c82c2e812aa530e9336606c7b05be39c96dde8ff501

    SHA512

    f5db16143e5f1f177440bcf1c5ef6625000acf6e8c7e5fc6cdc4e6840be44ae8408f6c184036c20bd54021770301bb44204a4adfd0806feecbce9afef4c3a3b4

  • C:\Users\Admin\AppData\Roaming\B8B1.942

    Filesize

    600B

    MD5

    f39d685e5ddf1f9b22f020e338ceed39

    SHA1

    4f7345fc7e7f7c881dee575b473f96d2c691d154

    SHA256

    8360566e7b3bdec7df90a89a0d5626c65c45866eed90f0a691acba626f75cc3e

    SHA512

    ca63a53684147ee4177e6512dedca3f3b4d578a4d69dfc6e813c3b996323972f1f1961d56e0f715e17552ce3389f5ad9f8e10fec241d1c02637537cefb614ae7

  • C:\Users\Admin\AppData\Roaming\B8B1.942

    Filesize

    996B

    MD5

    53deb05363d33bd838cf565e8dd5b8f4

    SHA1

    f90cb498de07858de93d50318b568b09ff93fa4d

    SHA256

    9e3a1fb172a27af18cccf80708e3aac66e64fb1d85ea0f88f6e7c3568a0a5326

    SHA512

    54e130b67c9fa91fa714ed8ca83a5c64ecea7381734afd9f3ad3223d4f1fc3bfce5d79737a58455cc1525fb86dd94fe1e33678f4f6809ff54cec5eb0a19a8712

  • memory/2340-13-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2340-11-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2600-85-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2600-87-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2732-1-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2732-14-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2732-83-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2732-146-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB