Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 18:44

General

  • Target

    JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe

  • Size

    176KB

  • MD5

    245daee68eea89ca3a91075c41fb7a62

  • SHA1

    b48dc350211830608197e895bc35c7bab80fc931

  • SHA256

    0e8151b85637b25c22bf33a83280dcccdad86803816afb753a236b38d76e91ef

  • SHA512

    6e5c08e63b26b96e2e0845b2341a2dac6c72a6d95aa714c3dd7073b20aee77e57ef05b6b33ce325f2b94f7cd0c3bc9f66b1320380077825f21f2e674f96d1774

  • SSDEEP

    3072:s9m82KS3gIf/zsadINGlYQHuM9ATNN/cMFAByiP3ioi6ZYn04PctBkeaiWTISh:s9PkgInwGImH9WTDcxByiPc6an90t2ew

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 2 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 104
        3⤵
        • Program crash
        PID:2316
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_245daee68eea89ca3a91075c41fb7a62.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 104
        3⤵
        • Program crash
        PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\0A0F.E20

    Filesize

    600B

    MD5

    d1d4f5476fd6f581ebd9f5ddbaa329b7

    SHA1

    74c4379feff3ff6c8593cc1035b76324a169a5d1

    SHA256

    b04168c447930b901f4181a012ef109e8fff0096ab83492af163d1f7bc9b09ba

    SHA512

    c9922906b71fdab31665586381744a1fbb5bf8f32a2f3cf8f6412def806446ca88f71b160a6cbed860408ba3b333bcbb837c39410114753aba5cd7050bdb55a3

  • C:\Users\Admin\AppData\Roaming\0A0F.E20

    Filesize

    1KB

    MD5

    aada8d798287be43923fd44f6a118380

    SHA1

    8027a6fd2ac92076be1d46ba3c2cc55ac9fbfadc

    SHA256

    68f95864571af495a435884492a54d0f6efaf74d43ef6819bf417ba3f66c155c

    SHA512

    2c3f447a408469195305e74cab00984118d0b523250b9500a5da7eb3b51cf8696ca223f33a25d8c608e511aecf0f8284cf797f460f78022fb14ce3b9aee9f08b

  • C:\Users\Admin\AppData\Roaming\0A0F.E20

    Filesize

    996B

    MD5

    c90ee2ec5d7e970c76f2e570bf713d7a

    SHA1

    0879c5924bd966b0603d7d4a0c88fef18232a7e4

    SHA256

    d6ac54c529adb94b87fa465e2af8179c52066a0b0d65a17102d92ced684ff08f

    SHA512

    dc0b69832ec2ceea8386fec3c4666d17d4de040be6add84c1ae6c0502060b19bf3bd809bc1ddb76da17b65c93bfb5d4b9b2bf1d0bd54bda5144cfefe72f8ecaa

  • memory/2596-1-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2596-2-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2596-12-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2596-185-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB