Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 07:40

General

  • Target

    JaffaCakes118_e08d7b8ee677ec9d46bb9d91c3a822f6.exe

  • Size

    176KB

  • MD5

    e08d7b8ee677ec9d46bb9d91c3a822f6

  • SHA1

    0b39a44517319bc15870ef643df46b9f176aa813

  • SHA256

    195dd81fa1ddcbe5fb2e51c2b6b03d594343f827f4db02e20f48efd76f49aa4d

  • SHA512

    8cbcceb6def1be35cc2f01d11dc4571cf1d976566a85baf934562b18256107a50e7337c1924c56516d06aea31dcbe220b4660efc556bed5d7d39daf851fd9448

  • SSDEEP

    3072:jpcJb5iaJImuviuyT00EqGCYPtjY/d7Lcq7Nz3d7Bi8gEsQ05l:V81ifcuyT0zC/1VR9BiRv/

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e08d7b8ee677ec9d46bb9d91c3a822f6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e08d7b8ee677ec9d46bb9d91c3a822f6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e08d7b8ee677ec9d46bb9d91c3a822f6.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e08d7b8ee677ec9d46bb9d91c3a822f6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:1940
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e08d7b8ee677ec9d46bb9d91c3a822f6.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e08d7b8ee677ec9d46bb9d91c3a822f6.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:2380

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\3BE5.F06

        Filesize

        1KB

        MD5

        299f516478367f90ccff5f9e9ce16fe5

        SHA1

        792c2e411c8cb04e379104a2e42b143e541bfdaa

        SHA256

        cb16fddce6c48b7b528b763bfc5397bc07fa895b6cd2219e60033cfc69648515

        SHA512

        61f046431bf753cf170e5281f10fe4f841fc333bddc9520cafe85c74b4b9d7bf4b32c170ba7e1a9dd3588ad8835df2c664dfbbf161da3bec30e41546741e599c

      • C:\Users\Admin\AppData\Roaming\3BE5.F06

        Filesize

        600B

        MD5

        4bbfb387bc3aa79f86c3caa67fc8fd44

        SHA1

        47d5f3ee187f5d8a0379cf2474844d806d0057b2

        SHA256

        e6e6d8add07282b7c04b3aca302479ff1dfb9293f734a8dbd5bf084686ec8a4a

        SHA512

        90b21c22f37c15c3ee7bd2a3cbbc6ba2871f4c88fec111eb19c6cc4ff1e3f71a5f9c2bb7962b819dbc30690ab7b8c04b25ad2e81b545f66a4ab920ebd2bf452c

      • C:\Users\Admin\AppData\Roaming\3BE5.F06

        Filesize

        996B

        MD5

        8aaf6db468f5df34a14660ee5dad0a7a

        SHA1

        a1490c938f38b472f1769f66d9917d0bb335d3cf

        SHA256

        c44df1cfe0b199fad7886e5439830ed3dbcded094615ddb7cf92946ab4673e00

        SHA512

        1c891ef44dc0186d6c2b2a4c9d6ed711dd934dbe03b7846a6e90b2f4bd14ad79e0e9552cd66ff1f233a68d1d110116d667ea30abda301c7f801ca86902e2beec

      • memory/548-1-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/548-2-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/548-14-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/548-79-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/548-182-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/1940-12-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/1940-13-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/2380-81-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/2380-82-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB