Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 18:05

General

  • Target

    JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe

  • Size

    192KB

  • MD5

    93874d928c1ced8a29c6c90793a9ade4

  • SHA1

    047855b976eec09361ba9aa670ec7ca03172aebd

  • SHA256

    19306c18d6426d49be40d2f210d185128ff0ad21d6ceb0ef6f6a82b333d2b912

  • SHA512

    c0bc1c2649015217bec4dd4c1ad1342d6963480ab8e0ce4a026c14358d05eb63d83c06f5ef685061c612325fc83e9895e88397f63815c8516e7cdf592d03efe2

  • SSDEEP

    3072:ECvA9JLl+1qsEWtM4h3phexdNgPmmbwUgwEdKge/OWIj0KF7c5UXJRLKz0o:ECAjsEWtM83/MdNgembydK9jIYxUZVKB

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2812
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93874d928c1ced8a29c6c90793a9ade4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\099F.E4C

    Filesize

    897B

    MD5

    495b2baef495e1c9892b252112781c60

    SHA1

    f38b7a28bab8837642770de34d06b010f2d68568

    SHA256

    d2daf7d78d5c8bb02a7c2430dfbb415db347f278eee11dc86c6ec860bd161c29

    SHA512

    cb19b73811ccf9a8ce8a8f70eea20b6b7c0ce554e310bdde9c075e20f48e123783ce82f35ded47e19420b2d1ef3a4b4a96f38fe4445d99727967899d04e84560

  • C:\Users\Admin\AppData\Roaming\099F.E4C

    Filesize

    597B

    MD5

    60f4e5cc26010247341e5365acbe482d

    SHA1

    49e582c8712e9de17bebd95e2ab3c3c42b6f7811

    SHA256

    5946ea5f0dfa16c61ecfc00c811565ce9200c3d7ff2e9b3e91cd00b571e852af

    SHA512

    a9ef243d43e6cbed33b293203122df2b9afaaf1f7f0fbbd47674124585a6667e59a0ea62751ffd8bc717c6b0285b28d941ddbb7b4590cfad9e256e791dabd01e

  • C:\Users\Admin\AppData\Roaming\099F.E4C

    Filesize

    1KB

    MD5

    e03c7b98d76d12900f174380a675e24f

    SHA1

    e579c40f5342963474302b29447516882aeb4c13

    SHA256

    2c829d2fcfd037aa76f5fa9870d80577c8a5ab29884c44a2ecb17ff2431ede5e

    SHA512

    76e87572825ec8a9c2bbea7d8371d6e0a0d65301f2de1a5b187cafd8cf954e42cb8f47eb1833873241faa045b91b923b98f9d2b040de8ebb2e0f070b59d4d5cd

  • memory/2196-83-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2196-85-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2196-84-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2776-2-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2776-1-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2776-17-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2776-173-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2776-216-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2812-11-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB