Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 13:54

General

  • Target

    JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe

  • Size

    165KB

  • MD5

    17e28a792f2fea781c5038ed34ed2c05

  • SHA1

    bc2156d0821b3b1deb963aaa7443331781cd24a4

  • SHA256

    66c501de1e311ae66ba47de335de4e16a8e3f858076498a8e3682853647dfc3f

  • SHA512

    ac7f4aad1eb07479a62950f5e520cbd1c1ba08340fc24a7420f0eaa61010ab3fdb706bc2adfbb6782edc25c74c3cd5959b71e52f6adc07f4398ec17999dde9a8

  • SSDEEP

    3072:7PlW+AhhuDcFQjXtMPXoJ6Q6QLl73qKk3cY:blWRuDcWX+PX7Il2KkMY

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe startC:\Program Files (x86)\LP\2CC2\F46.exe%C:\Program Files (x86)\LP\2CC2
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3440
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17e28a792f2fea781c5038ed34ed2c05.exe startC:\Program Files (x86)\2EED7\lvvm.exe%C:\Program Files (x86)\2EED7
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2D52E\EED7.D52

    Filesize

    996B

    MD5

    769fff713e43117efb48e16d04f365e1

    SHA1

    bfd8f47bb05fc0d29894b4f486a8af5801639525

    SHA256

    0916d83ad97233305a3e9d77a70ce442fc92e721581e1c789af61b620e4a1689

    SHA512

    73ebe0e77bd8a25a4c4bb2358db835000f3f051c63025a27b8cb5a0cb074285ca91974b65774bd9d0bfafa7df220d676459bfedbf030b4f25c60aa68a3b27bec

  • C:\Users\Admin\AppData\Roaming\2D52E\EED7.D52

    Filesize

    600B

    MD5

    5a31d794b082b258e75bd73a3b21b9b9

    SHA1

    72d01463c35ebfd0a9b7e8051087f1ffe24d4907

    SHA256

    c7d08ce5e86365a7b7ff4fca942ea405ab0f602e3c816f5a910c0072d3f0d3ea

    SHA512

    33d99bb61dbdab14aea2f00c83d3a7a1df4d826add783bf89805dea1f7272d1a666aecf1b73abda7eb83086ca155e6cf14519b18195c8c47db733fb801372faf

  • C:\Users\Admin\AppData\Roaming\2D52E\EED7.D52

    Filesize

    1KB

    MD5

    e76868e54b523dd17ecf40bca74a8714

    SHA1

    699c97802703cdebc4a2463aafab0a67607da3f9

    SHA256

    68f35024d0a3cc4ee4e27bc7d37bbca2bfe9bf8edb552ca4e1d30ed3a79263c7

    SHA512

    73a1b2c205cc86dfdbe952549f09823aa4a36615a509e51b59fda01ff060d63f7bdb97710b5635160da0dfa1d673be8cd92eb09bb940b6928e73e62aeddd3de1

  • memory/2040-112-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3440-15-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3440-16-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3440-14-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3960-17-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3960-18-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/3960-0-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3960-113-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3960-3-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3960-2-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/3960-263-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB