Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 02:59

General

  • Target

    JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe

  • Size

    187KB

  • MD5

    09bf2871366bd659106ef87a730dbb93

  • SHA1

    0def6e2171f09a8f46560eb1b08d2f331b61d3b8

  • SHA256

    c50b8784bdb9e7042be8780bfc29a1383ae374eb113ca85ef1ae5f240ffb0374

  • SHA512

    7c4b5fd67b8deb48d02a8283ad7a93e07bbadffcea40b1e7d2d84fc375cf8c8f66a94d51126d273c9d867d56bd39c6dcf1140e2effbca3e434b9c23b0ec8603f

  • SSDEEP

    3072:6ln1hM7rnOC9PqblNEs9W20+6aPl69QVrjIbO+1Bausz7w7EJ80JGZTnj:6ln1anOkPqbl2sUuPl6WIC+oE90wTnj

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe startC:\Program Files (x86)\LP\5E12\424.exe%C:\Program Files (x86)\LP\5E12
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2880
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09bf2871366bd659106ef87a730dbb93.exe startC:\Users\Admin\AppData\Roaming\2EE4D\AAF5E.exe%C:\Users\Admin\AppData\Roaming\2EE4D
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2EE4D\D9E4.EE4

    Filesize

    996B

    MD5

    d03d00ba414006c2ca53c9db2bdcf738

    SHA1

    ea6bdf95e11e1786905bbc9510d8bfdc805ceb94

    SHA256

    94fde5896f2fc6b625b45edd3d153093de77f875538f99ef2b1fb443f2127a31

    SHA512

    a441b55771b48bcff0bdc0f7e2b4687f5cc8811ede7f50b1b94afff5bf6113a1faf2573ae5c5f6710fea8d8f6e03118620135c7959a1edd5aa1028a776265443

  • C:\Users\Admin\AppData\Roaming\2EE4D\D9E4.EE4

    Filesize

    600B

    MD5

    0e7c4d964f0579732287a042b0ca093d

    SHA1

    9386dd9fd8f42cf2c973d1b3fedbf1e8d3b39939

    SHA256

    c1843e6edd7c4012d128c8748f2f5386183e51fee6720d15c6c1c8f607453d18

    SHA512

    7ae4ee8d4cce4741a0940d76bc5fd3fb559eb6e1bcd2c8c6caf50685777d327610f8be230abbbd01184cdd339c3c75dc3c486139ec74484a115162fd32288b23

  • C:\Users\Admin\AppData\Roaming\2EE4D\D9E4.EE4

    Filesize

    1KB

    MD5

    2868c4c3daa813f86744bca057e48a61

    SHA1

    7a4fa40d58177f41268b57818c8df975542ad3e1

    SHA256

    bc8000d42bf4ad4f8fd8afab9bdc12378c02c07ec10e55a889b58d7d4ff9c8f3

    SHA512

    af3cbbfad056d126dec42c06f18df60953ca1fb38c0e8af81d00ade45e28d155631d7677c01c4896d695ba9c2e67e5214931a1d5afd305bde2d003a3fffb4a7e

  • memory/1608-130-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1608-128-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1972-17-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1972-0-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1972-18-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1972-3-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1972-2-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1972-297-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2880-16-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2880-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2880-14-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB