Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 14:28

General

  • Target

    JaffaCakes118_eb73f2c78e339f39bcb636a843e8c083.exe

  • Size

    175KB

  • MD5

    eb73f2c78e339f39bcb636a843e8c083

  • SHA1

    3d65ba4fc1a9953ef20eec715c29f7edfd323211

  • SHA256

    25c3266b22e4ada9c1ffff1a383c9cf873e293f847296e98235d24c09f13cef2

  • SHA512

    bd06574bf1a297c596e988e90b2ba52b4d498b326a081b115f6e3ba8aa9c584e174a7334aad0ad03a91d557730651e603d597d3f13d1651c6d13cc6159d67af8

  • SSDEEP

    3072:ASZlGpwW2QnGISR/sNBE78oryFsY45Q3EuPz9JFp+Oyl8oiiZdWKOO:ASZ+72Qn7C/4a8orNh5QUuPDSJWoBd2O

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb73f2c78e339f39bcb636a843e8c083.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb73f2c78e339f39bcb636a843e8c083.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb73f2c78e339f39bcb636a843e8c083.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb73f2c78e339f39bcb636a843e8c083.exe startC:\Program Files (x86)\Internet Explorer\D3AF\9C5.exe%C:\Program Files (x86)\Internet Explorer\D3AF
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2320
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb73f2c78e339f39bcb636a843e8c083.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb73f2c78e339f39bcb636a843e8c083.exe startC:\Users\Admin\AppData\Roaming\FEA92\BBED3.exe%C:\Users\Admin\AppData\Roaming\FEA92
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FEA92\257E.EA9

    Filesize

    1KB

    MD5

    7eae1e03dab50f0cb297bf38e24b2ca0

    SHA1

    c3ac9012d257974e8d577e71672c1e9e04e8db68

    SHA256

    8544fe42132aa80d1babc6b58df6c74423ac884acb603d483b5273b5d7770d41

    SHA512

    1874f45d873a8c8a923ae8cabb5221c953e0408c8147b2eceaad0427d727f84f4b53d85adc5438cf21374f4af75a6cda0bd9dee0d942db074c8fb52833a0a06f

  • C:\Users\Admin\AppData\Roaming\FEA92\257E.EA9

    Filesize

    600B

    MD5

    0876a96a0ddf9c3cb1e45c8262dd0d95

    SHA1

    ce32c07f7d45d842003d073d8c7cd4c8ae87ae90

    SHA256

    62c8ad6b459e1b1365313f3139bcae29aeb0ad6101320256696982ce704b5b52

    SHA512

    d41966d7744c41edaa6455501b35fe24e40db29d20bce1a7d8d85814f73c2284380b676f7e53762c43f271acc7ad5706a15abcdc4fc87219a49cdc9326226cdb

  • C:\Users\Admin\AppData\Roaming\FEA92\257E.EA9

    Filesize

    996B

    MD5

    dead79dfa9a2af9864bbd567e53b8ee5

    SHA1

    540c0f934265f085d5fe2e4df9f7c106734f60cf

    SHA256

    ca7b355b662bbbc3b9f45578b8c8ed079d3d613c56334bdc4a1604f449df8766

    SHA512

    4a3bd1a0145dfbe485d02b915ec161b30bacb35c24aac2a09f0fc57635e310051fcf0f132a1d2ba8f83c6fb190c531fa04fedc549a38606c79e852b3d0a4f6a6

  • memory/2304-79-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2304-81-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2320-12-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2320-15-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2320-14-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2520-1-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2520-2-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2520-16-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2520-188-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB