Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 09:49

General

  • Target

    JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe

  • Size

    188KB

  • MD5

    2a70314e3cbe1e0d104b6093737aed3b

  • SHA1

    434dfaba2abd0549dc36e71d93c94da0362781d3

  • SHA256

    841ba2abe9ae03a658e08b74802eefaa5d10928954cfca3c3e51ae37a272a185

  • SHA512

    c9e1d431d158132907f982fd71e0c5e278c8c0f473c0e940f28d8ed90d1d18af3412db1d903173f8bc8fa9307f43f3dcd06355a1848de3794b8d6e374b2139c2

  • SSDEEP

    3072:y/59Bv2rGJQ1ylz/POFgqJheF46qL3Z3f//OoupzQfl8i9j:y/dvG40xnem6GZfexpM+u

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe startC:\Program Files (x86)\LP\E79D\A08.exe%C:\Program Files (x86)\LP\E79D
      2⤵
        PID:3864
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a70314e3cbe1e0d104b6093737aed3b.exe startC:\Users\Admin\AppData\Roaming\DB6D0\828E7.exe%C:\Users\Admin\AppData\Roaming\DB6D0
        2⤵
          PID:4548

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\DB6D0\02C0.B6D

        Filesize

        996B

        MD5

        25a636a6190875b1c6e29548bbd8e2de

        SHA1

        6fd062f75c86fed0609f649d25118724f04d2899

        SHA256

        b721ca3ae24634c7401d771b9ee783d790d3fa0542e48af1e277a31a28622b12

        SHA512

        68040a6f48dfcb4a4e49bccaa4686a2acd3ababa69b76fe3258dbc43ea39bf13dd2b32db04459f33439fc194ef5d60d2b31a7e79b8d592023da322eb8d645498

      • C:\Users\Admin\AppData\Roaming\DB6D0\02C0.B6D

        Filesize

        600B

        MD5

        f4c772ee8297c2a3df3bae2aa6373937

        SHA1

        597e3cbfef950df2028d3647ca7efe590224b3ac

        SHA256

        858da5c65be56e4c3983c8b204aa005b73fd909fe4f30cf34bae00620fa813b2

        SHA512

        75ad21052aef0897b14cd8301bce9ce66e0b72001af13c3f618a1070d8f3a149e93b5906e692a33dd64ca565a7ecae9cd1090093c9d324a0ac3b693a045a938e

      • C:\Users\Admin\AppData\Roaming\DB6D0\02C0.B6D

        Filesize

        1KB

        MD5

        e5037723cfb3cb3d3ee6299988136e60

        SHA1

        c4a01bc8826adf2569d498c6ff5fea3142cdc1b7

        SHA256

        5b168b6010e02e6ddd29542fbbadae2e08de06cd8f54734c6531485abb31f567

        SHA512

        89737e7f0e2bc0107fa642e57f3d49f0640cb43db42916001b88703943680c5c931b9a0407ae3cb17edfb154b95a988905a1b940ee6382d36b9fa3f7c0a6dfb8

      • memory/3620-1-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/3620-2-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3620-14-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3620-15-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/3620-311-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3864-11-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3864-12-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3864-13-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4548-116-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB