Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 13:43

General

  • Target

    JaffaCakes118_7817a43cf7f7350b05344ec4cce3183b.exe

  • Size

    163KB

  • MD5

    7817a43cf7f7350b05344ec4cce3183b

  • SHA1

    d7f6eaee04a9589b6e85fbd384390f46d75df400

  • SHA256

    4ca9d12e46b0f6c02aeca689eb943179e4a7b461cd643b535de1aa79abe799ee

  • SHA512

    4ead437b3f7f284cac582f1f5ddf9fe0493d1961280ff438884f6df54a7dcf87e95019bcbc7cd6a60381dfa02e34d2239060062a1d65657ca277517bdc64801c

  • SSDEEP

    3072:CgR9Vjfy6pdySxR9gbHhtGNlz0y5qj3wakjlLQBr8nhnH22KaYO4FHxqNmb9:Cg1yt2700OBAnhnH2xaYO43Qmb

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7817a43cf7f7350b05344ec4cce3183b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7817a43cf7f7350b05344ec4cce3183b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7817a43cf7f7350b05344ec4cce3183b.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7817a43cf7f7350b05344ec4cce3183b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2968
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7817a43cf7f7350b05344ec4cce3183b.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7817a43cf7f7350b05344ec4cce3183b.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FD53.762

    Filesize

    1KB

    MD5

    743e404b05cef14acaa57883495fef3f

    SHA1

    05451c3a354f2646296acf171735b2fca0788062

    SHA256

    9f0255c355bbf9c7e47939b24bf6d37075ee57bfb6c71c9659ad117678e4f9e0

    SHA512

    0cb3fee6d009481363df6234eda474c7d0b902130d78e52f49aee35a112919d40b5136e4eecdd258171cd2f51bbeb6405f44b7ae9cb9005454eaca6b576dabfa

  • C:\Users\Admin\AppData\Roaming\FD53.762

    Filesize

    600B

    MD5

    9e13e7bcc5c73fca734b6f94f3d26b51

    SHA1

    f3b7f34263b0a6c6033edf0fbaeee8d4a4428d30

    SHA256

    bd3b7006d9d0bdc6fa5abbfd9188558b4feed7b789464c9b544e941e481ed336

    SHA512

    4ee6c0670e128f3fe99da0bbc577b95ecf6977046aa6b16af15c097e7bb7c1a7328848ee9a790d244aa605a226878c5aaf046e33218c6840d0cd3d12d446141f

  • C:\Users\Admin\AppData\Roaming\FD53.762

    Filesize

    996B

    MD5

    f034402eb711575a994d5db47e274429

    SHA1

    8fcdf9e464e3dfac64070866a11b7beda1c2b750

    SHA256

    71ee686192ab970b068d91f3ef19875d3e9fbd8e89d8ab758549ce75e2cf459b

    SHA512

    a75d5e346dec962084b0ba112d90eae242bcf1bf5baf3cfc7f6ef6938d2d7fd1aaf7e6e6f87c87fd7bf2263875f7aa3e57d836ce9a5f42f25d589238a3ac4dee

  • memory/1876-88-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1876-89-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2296-1-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2296-2-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2296-15-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2296-90-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2296-197-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2968-5-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2968-7-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB