Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 06:22

General

  • Target

    JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe

  • Size

    153KB

  • MD5

    dec584451a93a8cfd4e3631ee00a2cc2

  • SHA1

    d0132f17b5d4057bdc633c62ad04c85642dfc994

  • SHA256

    a13d22fbcf3e5099e6f13ee80ac8d416a9f47b796775597af3e082b090feaced

  • SHA512

    6599fc29a5095fd0dccfd1582e7548abf523f51e537be50cbaf8dd8d88b7b6021634eab545297afb4c326290e3fffaecc9e15d96e285d53913db7308658a5fc0

  • SSDEEP

    3072:DfnC3neLjSxerb1feK8UqoPVyqahAUYsHRCIgSxFe2nrH+GerndB:DfMn2+xerJp8UqolFlpOeuPeDd

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2188
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dec584451a93a8cfd4e3631ee00a2cc2.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\48AF.F2A

    Filesize

    600B

    MD5

    93c22a640ea187e6b56a2a4c89c71f24

    SHA1

    c4291cd71cfd12c5d2fdae4bd39ac07f724dc019

    SHA256

    453665d0fced96c598a4e21320181a621c6e6b53aceb3cd77b6df9b9cbb44875

    SHA512

    cba530ce4e4b969b060a476c430720a40dd25ec252e3cb531dae3609d56583a6697e67b26349f8148beeb7d0f7c028ad81d06f9420bb124e37b575581cddb4da

  • C:\Users\Admin\AppData\Roaming\48AF.F2A

    Filesize

    1KB

    MD5

    db5f901eaca1807b5977ea51270e1649

    SHA1

    173754e2892dc91dc5b8f0194953dea3fe7e9668

    SHA256

    a1c012d8c532b4910a5eb201b836f632ce2cb6b83de43545d8ce51ca6ba18c4c

    SHA512

    7f8852bc994bca074e6cb719e0d66a68bdc3dbbe0f10e17d65761d2a6ff1f5fc97d9d3d8b168ad273ffdd6c0cc7d13a46b005e586a4936d41a9a329ff3b6aeaf

  • C:\Users\Admin\AppData\Roaming\48AF.F2A

    Filesize

    996B

    MD5

    12dd69aa52e1d8eb7f932e0462fb24b6

    SHA1

    ff15de98af2270fa7764518aea303cbfe97aa4e4

    SHA256

    cf61e9e258255e25d54610f904d2f1a416456661a681bf07577925fa699053ea

    SHA512

    3007ec808d367ff141deae80f1358d7fdebb7dd737ac4b235a539784ab0b0f7ba10fe99039e180bf3dde69938a7684ad87902a104af49aaec7150ee0c4559ef5

  • memory/2044-85-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2044-87-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2188-6-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2188-5-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2992-83-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2992-14-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2992-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2992-159-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2992-2-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2992-203-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB