Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2025 11:35

General

  • Target

    JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe

  • Size

    176KB

  • MD5

    a8b17aebfcd64862068ee2635acaff35

  • SHA1

    88e58562af8f52527c7ad4bdeffb1e138cbc7f7f

  • SHA256

    23c0f4cd9090b3e3f6b5be673dc8bbab70431f4736cf05f39fcd854527413ae9

  • SHA512

    e87c11a5d3b132db23c1da47213318890b2c35857dd789d52309475264f5f98f88f43c91e55d7f5ddd07f9f3c3caf0eb77be8ff047f1a090f4bb729c25f8fe78

  • SSDEEP

    3072:/CsNAKJx/U5K5X81JAhMcQM3+2Kl9Vd/PwmJ35I7EFEes5iPMARCksh2c6JNB5oS:/DAQG5rJgMcvgl/Pwc36OpXR+hF6z7bX

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe startC:\Program Files (x86)\LP\BD19\96D.exe%C:\Program Files (x86)\LP\BD19
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1692
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8b17aebfcd64862068ee2635acaff35.exe startC:\Program Files (x86)\A2E70\lvvm.exe%C:\Program Files (x86)\A2E70
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\9A4A2\2E70.A4A

    Filesize

    996B

    MD5

    20b8540dc977c687d793dd70699d038a

    SHA1

    65aa3aadf3af72b0dcf8399ad4e014ca2299433e

    SHA256

    af38d5c536f3dfcbfc36bf567d76ba3342fd3477e8d6e3e89504553bf3776cd0

    SHA512

    ff87a01e36f7faf7171fe0631c95d36682ce4ec2ae7e0cfb8ada941e61d2295c16785d7b7a56de0af985a24bd4188ac9ad1ce732276876d44f4842f9c4b24233

  • C:\Users\Admin\AppData\Roaming\9A4A2\2E70.A4A

    Filesize

    600B

    MD5

    02166759454e8fd55c947211e26b2b6f

    SHA1

    8c1ab2d01e1dcdad0cfa9b981f48aad344448089

    SHA256

    ab076e7539cb1cf780d0c2991748ec311b657833af0c3272bfa35cfd3be4ce5d

    SHA512

    e398755e65eeba9b7208df07d454a8e59d250089a93ba6356da67f551afef710a7797e948ffca5308c48aba026210391b848fcb3c0cce299fb1ccd698a70c010

  • C:\Users\Admin\AppData\Roaming\9A4A2\2E70.A4A

    Filesize

    1KB

    MD5

    a6949c0570e9f8fdc0e293f1c85cdd1d

    SHA1

    19690decca62e2fa9b30ca03f3d2539e9a9633c0

    SHA256

    14434016678ff76de13ca9d02d2cda991258557b43da0773b0f05ae5975178b2

    SHA512

    d1b9e5346edc2d3b7ea10aed672de1977bcff052afb01b91c0e7af06390f20f2917a104b697a661d037eb5210b2a5cdbafda9547541b65bc68d3fbbcc78108ce

  • memory/1592-116-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1592-15-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1592-16-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/1592-1-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/1592-3-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1592-294-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1692-12-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1692-14-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2856-113-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2856-115-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB