Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2025 13:56

General

  • Target

    JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe

  • Size

    187KB

  • MD5

    ab9d8676d6267c466fbc98498442392d

  • SHA1

    2a0ccb91b7b87de5fcaf32c5bdb5cb3e269a45a6

  • SHA256

    1df1e2601c47d80034ab65caf1b118627ea0b89439f83d55f7a1425b04c9657a

  • SHA512

    23bccac7453ac366f3d7d325d8604c3c5b1eb9ac4860e07faf096f79564328634e9d10ca19dd15a9d55b293a7a41bf738e1d6aad6adfbe948eec6feff10c6c11

  • SSDEEP

    3072:Ei5wWW0AYX9dbOKLCNh072GeTm9sZuKp2nPSqgPXWL+T5hC:Ei597diKeCa52Cth

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe startC:\Program Files (x86)\LP\48BD\E38.exe%C:\Program Files (x86)\LP\48BD
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2916
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab9d8676d6267c466fbc98498442392d.exe startC:\Users\Admin\AppData\Roaming\DF348\F5B48.exe%C:\Users\Admin\AppData\Roaming\DF348
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\DF348\8D0C.F34

    Filesize

    996B

    MD5

    fec301ebbbb635152500d4c2df453b85

    SHA1

    6dab471b566d0d0c1b5f034e43d31e95a7a5461a

    SHA256

    4792f3f096ef48b6d71b2ef1744274be576a7a598c087a2a6dc6b871fab523b4

    SHA512

    686a9461a97585d367d142a6f33de6d4ab9035f44584d973537a77fc8aa8663d56e0a46f5c7e365a6edb39541677caed5ecb65bd15ce3dfaf8d81d5084163df6

  • C:\Users\Admin\AppData\Roaming\DF348\8D0C.F34

    Filesize

    600B

    MD5

    cdb54bb3604fd61e0093aa520135a6c4

    SHA1

    e657515d967bdfc5809044165b3eec0992f1928a

    SHA256

    a147d6c6171b1ff6a9358aa0f410da6bc648e76f61962da5c9ec081b5b7df79d

    SHA512

    d4d76429eff84d89796d7589b8cfd7c3306c157463ef1a492d7078bad24b646a8101774f1696ee042138aad3b4ac51b3fb046d434e045635c8f502e50f6ed6e2

  • C:\Users\Admin\AppData\Roaming\DF348\8D0C.F34

    Filesize

    1KB

    MD5

    93a653d73a1fbaa570bb471f1b45fafc

    SHA1

    c8643ebbb012741a52e83b390702400d9b5bd92a

    SHA256

    31b320d375f6338d6b3ffd69967f444989c0b05a580df08db24357924cead640

    SHA512

    bc0373ce502ffd4c452d46b1e809fda3d82847d331e588f95a0d83c9b0d244e723c800d14b58eed8d12a021885833da6ebeca096ba46bbf8749fa7734014e273

  • memory/1652-129-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2744-1-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2744-2-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2744-15-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2744-16-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2744-284-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2916-12-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2916-11-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2916-14-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB