Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 09:58

General

  • Target

    JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe

  • Size

    187KB

  • MD5

    a6b6fae00bee7da928eddae33795b4d9

  • SHA1

    dbf46ccee8a223ab8307346715d375570b42bc11

  • SHA256

    283d2334a993e01097c1c7d01e6d5a1bbd531b77cb9ed5ef4bec802055fc49a1

  • SHA512

    7781aba5dd8aaff9435853ced299329ea32825359309d27eebaaf7f68d3b8681eb2683d4c2c208195a265bb04fa9a84e447b7dbc853fff3b21d88e00ca9a0c58

  • SSDEEP

    3072:TbVFc9nDbdmVniB4vegqy+fzQPRnSj/tr2SfGNxkqsm2We7ditqoVzhRtvmo0M:TCtIniBa+rYSj/52SYs0cdiIoHRl

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:4912
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6b6fae00bee7da928eddae33795b4d9.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
        2⤵
          PID:2560

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\CE12.84A

        Filesize

        1KB

        MD5

        370c851e8c84cffa34fe6e48aaf13cce

        SHA1

        a34843350f5fd8711a2eec849b3746d73df4aa10

        SHA256

        7f7d6c3d9f49dafdfeff290ebda06fa5a05b53293425d7c55ca68838078b4ad4

        SHA512

        8e2e15baa7453eecd167b4a6d0070faf3d6fa321ebbc75f54af514f2b08073405f81f24e8fb2ea76e0aeb9779a43b256681472658677318ce2a52bc403a61e73

      • C:\Users\Admin\AppData\Roaming\CE12.84A

        Filesize

        600B

        MD5

        5612255145427e706d6370f70ce228b0

        SHA1

        c750c8d092d2b135c4fb3232ba1dd9cc7e333daa

        SHA256

        2d2d1023ab8e3929b48bff0d33d55b0490f312ece201ce8fd28758f85a4e486b

        SHA512

        395fd80c091d4929ce82c8c8cfbec6202c6ce22537e77a23e7965f074e889d3479c7f82f3a57f3ddabbdb09036490249084d997941890c299f28558eec85fcdc

      • C:\Users\Admin\AppData\Roaming\CE12.84A

        Filesize

        996B

        MD5

        47adbebea09c3739ded124e2bfc6515b

        SHA1

        dd5cba685ad74c0c203533787457275258f83c9e

        SHA256

        d1a8b87bae3328b5f9f929982c3722b1e2b28e29f9a965dec7106f21a56d175c

        SHA512

        26865614161078dd6629174db4c59ec5207f8d5c415ea93a2663697200fb9ed2f57a0a83809906038055c349758303bfb745e45f0068d2be894e2136c7135dbe

      • memory/2560-87-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB

      • memory/2560-89-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB

      • memory/4604-1-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB

      • memory/4604-2-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB

      • memory/4604-15-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB

      • memory/4604-196-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB

      • memory/4912-8-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB

      • memory/4912-10-0x0000000000400000-0x0000000000471000-memory.dmp

        Filesize

        452KB