Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 01:06

General

  • Target

    JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe

  • Size

    185KB

  • MD5

    b930233139d4f03d842e104d6f6afb9d

  • SHA1

    5b34cd1b06c9f3d3a65e57e20142d7e358257662

  • SHA256

    a3bdf89307e1ff48a04c4a2a92e12674e4bf5c2d2272d152ffd14542074092c1

  • SHA512

    5f553a8fa3e4b35ffbc0d840f5b9ea96e53f3311004d8395c798f009add8d5fbc1dfda50e3434967f164748bcb8ee8ccf973c6917a945bc8b2f0bbcc3ebc1327

  • SSDEEP

    3072:LEhruDjbqkSoGsBj/4TJPZdxiqfUh17zVhpyfUh+hvHWbh49g3UlAiYN:UrumPEjwrC17J6Uwt+h49eUW

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe startC:\Program Files (x86)\LP\8E33\D5A.exe%C:\Program Files (x86)\LP\8E33
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2388
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b930233139d4f03d842e104d6f6afb9d.exe startC:\Users\Admin\AppData\Roaming\37950\DBD8E.exe%C:\Users\Admin\AppData\Roaming\37950
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\37950\0E1A.795

    Filesize

    1KB

    MD5

    f5918dc215c7772bd6a5a70ec33433f5

    SHA1

    d4ac45d8601c1b8976fba2a5286da8a4fce72f0e

    SHA256

    c7df463b6604000ddec017b7d30ee7a5ad993f11aab2dca0940dd276bcc56f73

    SHA512

    5d21ee0f9ee36220b237663c48138e081085559ff71a708d77a8b759b3c5c8988a22a45a9392158fcdbf42ada31feb4f9ed3ea6d96aec77ec4397beeea635dbc

  • C:\Users\Admin\AppData\Roaming\37950\0E1A.795

    Filesize

    600B

    MD5

    df280dd4e4df6997f99ba1c0db56b06d

    SHA1

    31fd2824b47d370bbfe025454a7ce864667152b8

    SHA256

    89856e5f097f17ce1f5108f7eddbecf713f416d1194c13cbfe371c72271fe78b

    SHA512

    5f0189e0e92cd6388601f613d4269edf937ebc8f6331ebc7dddf77c7cfce705abcbcb3519588f238e4d1b455f0ee0a4afa46a52646eed3830dc96feb7411f8d8

  • C:\Users\Admin\AppData\Roaming\37950\0E1A.795

    Filesize

    996B

    MD5

    0e3d45cf9a0ea91bee553de7c4f7faef

    SHA1

    7b739e825302010ff5b6220a9777e39ae98f2f41

    SHA256

    77431101a32ccb78d889b1b5947bc43eb027172f70fc79004cb6b216bec64ffd

    SHA512

    8cadfccafeefda5cdc9e679cb9a0523b8df04de8ae397754a2c2d96768fe3cfef03b685cdc2018a1454cb56f98ed23e28f38dceaa01d324c49f1ce633dbca4ca

  • memory/2388-11-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2388-14-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2388-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2436-82-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2436-81-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2556-16-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2556-1-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2556-15-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2556-2-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2556-187-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB