Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 20:02

General

  • Target

    JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe

  • Size

    182KB

  • MD5

    38bf2a8b1f4c73c42b9855ccd13f7c28

  • SHA1

    2cd13b659691d29471e6ac8a61ef138ee73bb50c

  • SHA256

    0eb2c8a34b7ba4e0abd4a6d94b20308d403e5eca5f90a8f5921821d4e58768c3

  • SHA512

    63480544de946af4ff372ee0bc47abc32f9aff75dfe6b1541ff52df1be61e00221a4e90600fc9f15f0cb6318d133ea9f3d1f597d140df9ec0dd8a3984a39b847

  • SSDEEP

    3072:QQEM79d98KzHVu+H6YzNwHyjKTqxBUpJs/gegsrDpV73QxrIUtxgX/LjnAB9ueJz:TD9d98KzIPqOHyjKTqxBdjrgJIUtiX/K

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2536
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38bf2a8b1f4c73c42b9855ccd13f7c28.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\6B86.0FB

    Filesize

    1KB

    MD5

    821986a4176f3932472f09cb7293f28d

    SHA1

    e81e8c7c1dd958d69130cff32ef99583f7a19fc2

    SHA256

    268011258b5e8d81ad4b74911845c4cdff05da1808cf40ffb658abbe85198780

    SHA512

    38f8dd91fdb3a202e175228957a65c58f47867f4082230ff30b47e6b09db0e47503362fbcdbaac6033ac0d177634b59d13884ea7c3d02063231c4d66f45698be

  • C:\Users\Admin\AppData\Roaming\6B86.0FB

    Filesize

    600B

    MD5

    86ab49e53e1301be0e5dd4cee8799145

    SHA1

    f0ebc454175fe800f748c9c426efb1b245d037c7

    SHA256

    72b0b29a3b69c354b49b996e13311929cabed3be8e7efce1f88cdc60800e6f51

    SHA512

    62d844386684499ddac7085707b20a0daa2478dc9a41cc8a7049ebe8162a901ac8fb9fca15efec3195dcf0174ccf9cfcbd3af09be4fa095e85194adb650586a6

  • C:\Users\Admin\AppData\Roaming\6B86.0FB

    Filesize

    996B

    MD5

    0af247bf9d36e68d7943690eec262422

    SHA1

    55dbefa90df4ec9e43e925cb25d728fd21cf6e43

    SHA256

    15a6c0e9fb2f04fcad0dd01436bf64f01ddd4c24297fb4b8f3d3c95d70fd0520

    SHA512

    ded588c2fee22bf39da5259f095033b1d5e2147f671df5357f458d62412662fe8067df4b8e88cb8602355b96e0c91579e856470cdb738116af16970f7c3e6acf

  • memory/1260-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1260-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1260-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1260-191-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-82-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-84-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2536-5-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2536-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2536-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB