Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 22:46

General

  • Target

    JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe

  • Size

    177KB

  • MD5

    0073617452e565600638d5fd0eacbc06

  • SHA1

    6a424cf725b8f11f9fa06d25ab751f92aa877387

  • SHA256

    2dd62314387ddb349ef02b420be993317d930f4b6a3d75b05eda95aa79b976ac

  • SHA512

    ff811c74974adf0c02019e0ebd100054e67425be862d03e2cb0e38cd2934da2478dfdbd949c943943bf98b34ebe5b0ee13bb0a78fdb29c86798a185713046477

  • SSDEEP

    3072:foWxa8ej/V1f6O7rX4HhAZ8VSuTitInIpuLwkAjanQ++/tr9AXlNzE/EIQ:foWQ7/VR6OgHOC0gI+R2L++1YlNo/Er

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe startC:\Program Files (x86)\LP\832C\E62.exe%C:\Program Files (x86)\LP\832C
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2900
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0073617452e565600638d5fd0eacbc06.exe startC:\Program Files (x86)\E0FA4\lvvm.exe%C:\Program Files (x86)\E0FA4
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\C14E0\0FA4.14E

    Filesize

    996B

    MD5

    2ff9ea255b7d89af455a605f79eadebf

    SHA1

    e7ee7c76a611396db5b1afc2e86f54668f9f4f14

    SHA256

    5df4498810b53db13e3e143576261d67e7200106fe604c2aec0b42ea3dd011af

    SHA512

    1e676bcfc5b4a2fc14435ac66cc05cbabfeba85b83779e6972cb6c0112ac6ca8da92ded5fe56f37a5891f9e1d30c5c351930863595546b48c838c9dc55536597

  • C:\Users\Admin\AppData\Roaming\C14E0\0FA4.14E

    Filesize

    1KB

    MD5

    d83d25fdad5d877f316a9084eb8d1562

    SHA1

    501952094fd136ef54a2a90202c2d9fbbef135d4

    SHA256

    f08393c3d9cc07c6b13eedf5cf58fcffb9628f2aa437065726b81f2009d2d3bb

    SHA512

    4b9c9ef71316f1b3ffc54bd315616f2381b452484cc510351137cf6cfa23e622060f4416e8c7fe3e7db06db7a7bf94ffd2aa7880beee7b22bafb6e388804b61c

  • C:\Users\Admin\AppData\Roaming\C14E0\0FA4.14E

    Filesize

    600B

    MD5

    8b39e5da509687f473cf8abe267a3bc3

    SHA1

    8a44dcd13bc38dc3510aec63ee4d8a3170d09700

    SHA256

    3bf560fcee1cfab1187de33188a3fa8c61f8e6d0ad08e2a45680580922e4ae09

    SHA512

    3183f636f7b3a76e9e05c30e0fc54ecae1fbc5dabd9d2134ee1e50fab36ed233d26533f913039c14288759b57849ea4f01acaad649e5213c2dff6a1a602c21af

  • memory/1972-130-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2884-2-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2884-1-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2884-15-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2884-16-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2884-131-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2884-313-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2900-12-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2900-13-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB