Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 20:39

General

  • Target

    JaffaCakes118_96ca09f7b8c59df3f343631eeeaa7a7c.exe

  • Size

    185KB

  • MD5

    96ca09f7b8c59df3f343631eeeaa7a7c

  • SHA1

    e591fb9c93e47236b65719ecfc19ddebf2fe910f

  • SHA256

    a37d758d3db9105eea47945d8f5bcff64ae74378296b37bcce2efd482cdc38fb

  • SHA512

    4351db80a4b2f3ca0ecb90f5858cb57b1b7815ede4993173a77e3f6c5e0255621b819f6af820ba82755c14d69c5c8a1d357c57a063a2e2aa6da8621af46a0495

  • SSDEEP

    3072:mdgwdN3lgAaLaRMn6e4swtF/vcl8X4spcUAqq1fUIRGlj0jUw2I5rc3Raa9:RY3iAaL0cEt9cXspHFyVGlm2Ia3Raa

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ca09f7b8c59df3f343631eeeaa7a7c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ca09f7b8c59df3f343631eeeaa7a7c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ca09f7b8c59df3f343631eeeaa7a7c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ca09f7b8c59df3f343631eeeaa7a7c.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2804
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ca09f7b8c59df3f343631eeeaa7a7c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ca09f7b8c59df3f343631eeeaa7a7c.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\156A.5BA

    Filesize

    1KB

    MD5

    abdc11aded7971245c7490339cfda9c5

    SHA1

    4facb6085778b55ab12999d79e7b377ab32f8327

    SHA256

    dfc375da1a1246a052e71773ea9df6b6a67f4795e796dc72c6a6e4fa068d0d89

    SHA512

    43b5e8bec3d95bc38cd9f4a4fa0ae423fbfbb6b620e914e72ad1a07af80340d514cd69f65fd0d4ee9405a567cee6d5c6b29d987f6d392b1962d7aa6b8b2218a1

  • C:\Users\Admin\AppData\Roaming\156A.5BA

    Filesize

    600B

    MD5

    118241205671044d87477d2e368bd616

    SHA1

    53f2c516aefe1a51498a764f858a1308528ce6b8

    SHA256

    3b7db25a5f265658162e10b10fc32ddb74063d10aa340aa3eb6bda3aec4f6ea7

    SHA512

    e4d965ae8af4b47573915e7fd0c0fb49a9c475dc812d3cce4ff5949463a65f80f70d38a44726c5103937072e8de4f541667cc522204f985c5d2ea9b173dab531

  • C:\Users\Admin\AppData\Roaming\156A.5BA

    Filesize

    996B

    MD5

    873db04640ee775d6e59e56e237d0ecf

    SHA1

    691c417fc8c953b2f79768b2f5c68fad20435992

    SHA256

    31cf70ad3eba5b4f82e2555a8f33d69083ccdcc371ad3957e32ce36ce24289a9

    SHA512

    8459bdac479480a1b94e177ce6266aa3390bd23879ee1f7847ca174581cc6788ef3e2489330c498c1daac7965be95cc8e80b0ab44bdf31ae089b0c28e97e288d

  • memory/2628-76-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2628-78-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2804-5-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2804-7-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2904-14-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2904-1-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2904-79-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2904-2-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2904-158-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2904-193-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB