Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16/01/2025, 17:50

General

  • Target

    JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe

  • Size

    192KB

  • MD5

    7dc18ea3968011baae13911dbfdbc7a4

  • SHA1

    c40f3ee72d6439a5aea08624b24d8b5d8113a26c

  • SHA256

    6511c7451d8c45ad25111e6488bdf7d2ce0f0d91d5d37dbee82a16e738e3b04d

  • SHA512

    06b3a2239cbf9eff0399d600c16980012396075e136e3b2548b9fadc4c89d2eb2800b34a7b6f581a310d8590a199117f5ac6d4ee7144a5a8940db253ab6877a0

  • SSDEEP

    6144:m3EJLSL/1FuwlymAZc+Jv7FIq4NxevIanpYXQl:YEJLQ/1wo/qrgxevIanpJ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2740
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7dc18ea3968011baae13911dbfdbc7a4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\1013.A25

    Filesize

    1KB

    MD5

    133b214fbbe3c25bbacdbeefd502d6f3

    SHA1

    0a4307e5234c20017583a2d849b7de2b972e697b

    SHA256

    b5837f406c5fb40f8b48ca6e4e55ef9a0de1986e152730a03b09429e4ea757b4

    SHA512

    9bcca3ea81962e3ee1a983316e0ad645c5b58ab2c4ff58a2badaab22f5b1146d543e687865bf01153b80c3b4f474da6be477d8dc4037e4a6df98d5e858d5e636

  • C:\Users\Admin\AppData\Roaming\1013.A25

    Filesize

    600B

    MD5

    06be9b4e553f67edac5bed9f932c45b1

    SHA1

    47d34bce04add9e35e6026e7897531889e1dd691

    SHA256

    e47fa70db68a9273f1795e780cc6fd1b1c6a5dafdd06aaaddf4a180dd221fc9c

    SHA512

    2f95b02cb826933ca12e060759272f155d877a51c938a16d548cdbfe6b0266471c9160a7cf873a20f96b9fb7ceb8e68786d5bd2297ca782f28e6bf7ac9d5f06f

  • C:\Users\Admin\AppData\Roaming\1013.A25

    Filesize

    996B

    MD5

    ba4e4d7592ffb8338c14cc16bf01f35e

    SHA1

    b441708739155176dbb733e0feba7a93495ac379

    SHA256

    3bb24190ea4e9cf0a90a781e87720464518e7b989d8c76eca755f5fd78d67d93

    SHA512

    335e0d1eba8da7ec8e6f029d8837d22d2200cec8df9d84b55c6e284d9819d6c304fc24892ecd18cb467b355d4e0eeb91ea60752d1c1966a3272938a7da62db37

  • memory/844-1-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/844-2-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/844-14-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/844-200-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2740-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2844-91-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2844-93-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB