Analysis

  • max time kernel
    141s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 12:05

General

  • Target

    JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe

  • Size

    173KB

  • MD5

    3554b0cd570e8d29242b9cc31bb66fab

  • SHA1

    f137a863bd7309896c243aa9a8a06bc70f5579d6

  • SHA256

    906c5db5b81bb5b112ed6f3ef2d3181bb4869e82e4e3a40b775e5ecaed3264ed

  • SHA512

    62a0e10a8df1ff48292630a04cc03105fa29fdcb6a7321d61cac911b7d2fab6554d2fabdce53f67583270264689d0499fd11b1721ae0eb1ee435508f8efcfa8a

  • SSDEEP

    3072:02EXXq0sLf5/tUj8JxMHXKbMmQppXuNR7D0+HIldhkeFVFuf2jbU7xowAM:0j6prqQj2eN1jHIhkqW2UlD

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe startC:\Program Files (x86)\LP\809B\F7B.exe%C:\Program Files (x86)\LP\809B
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2380
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3554b0cd570e8d29242b9cc31bb66fab.exe startC:\Program Files (x86)\382C6\lvvm.exe%C:\Program Files (x86)\382C6
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\B3338\82C6.333

    Filesize

    996B

    MD5

    81c25f548b18fbc8ebbc7e3b867b9eb4

    SHA1

    8ce731a59ebc11b648dae90acf1108681e219aad

    SHA256

    dfcbf06f5bf1fd685d9e7a0c5014e27f520da19e90c6fc4615b3145777b073c7

    SHA512

    1a1539d20e1987286b8136adb9fc907104a23848bcf53a75a0c2313169feb345eb24428b024a254cc83316037856cfd75026b9b9fef6e389742b77627100e15c

  • C:\Users\Admin\AppData\Roaming\B3338\82C6.333

    Filesize

    1KB

    MD5

    9450a329cfe36d1fdc8209116b58337d

    SHA1

    74a5eb404ceca36a8098ad948425b54bdbdd9d2c

    SHA256

    73cafb9fc03bba9ef28dfc6691000aef10191fdd8bf29aa8a650cf71bd7417c4

    SHA512

    3088d57845d48c4671d26381f6d1eaeb667ec44b1d531e472d8cc38adb87a27a00fcf14e514e937cd40b54fa612acd7b1e8c2a571e9402d8509edb4449a58ece

  • C:\Users\Admin\AppData\Roaming\B3338\82C6.333

    Filesize

    600B

    MD5

    c7569081cdc365697654e0bc726da742

    SHA1

    268085cb3476b83225f6d84531c7aed3c5482759

    SHA256

    a22a6e494e88caeba7781e469f4304eeec3f29af23c4dd172103da1a2a8262a1

    SHA512

    5f33826dddb0c540ea8a00f8c07b695150acb56e6acc64e0cd54a9a9630fb026249b031cefda8b481be016c6a6906c8ec5e1e8cd1654d22d77177ccc203d0826

  • memory/2380-13-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2568-136-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2568-15-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2568-1-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2568-14-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2568-2-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2568-330-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2568-331-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3016-132-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3016-133-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3016-135-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB