Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 20:10

General

  • Target

    JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe

  • Size

    192KB

  • MD5

    38d0284f390540324bad53f4fd6a723c

  • SHA1

    205654b5fe6e8ea6379fb0c02ac801515e9124ed

  • SHA256

    0fe6a7d56da95f7fc6941f1a0ca462c2be1524bb2a999e5909bed73deeed7459

  • SHA512

    732095c4ad9e541931f83113b26d28bf8e9059a5a4ba03c8be866b9df6abd469504995b49e08cd1183a785b77a76fc23daa6ee687e79c3a84000b0fc04bf6e46

  • SSDEEP

    3072:SWtfAwfqNrriq/WkhtqLkiWWxw7R/zr/FJt/XqDXdl+sPT9troqn:XXqJriG7htgT0BJJtCdQsb9tr/

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1984
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38d0284f390540324bad53f4fd6a723c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\209D.214

    Filesize

    1KB

    MD5

    57a0706e6f8048fd77be83c7c6f11e96

    SHA1

    989d7aa059768d751f3af1cbf0e68eef855d58ba

    SHA256

    5904aeee498e4db3781b259be857a5c6fcea3751c500ae30b10e1c944e64ca45

    SHA512

    75d10be798e4516508a9aa451d591c75be72fda4da307693fe24349292efae875811467675cfc0d33cc26ef95023ae4614e18028a11e8be5110f052deef47430

  • C:\Users\Admin\AppData\Roaming\209D.214

    Filesize

    600B

    MD5

    75321ef99cad868018395cf18d6e0528

    SHA1

    08fa290a8090f9d78ec8b47bb1d91ce1d71b25df

    SHA256

    f4bdba35418c5cb66c00f4f081c3839fb272e4b8ffeaf54ace76962e1196e2cb

    SHA512

    ad0c9588a0debb0a6410fabcc970758c8bc554ab9d52c5adf03f827f148497251845f9c1fa4aace5927fa953fcbfb166ff4e00d1693a4ccb0ef00c4961fec7f1

  • C:\Users\Admin\AppData\Roaming\209D.214

    Filesize

    996B

    MD5

    f2dea45ea9e5e9fd662170d82a3b679c

    SHA1

    357e1d2e463f867d1e7107898d702bf94e34ce6d

    SHA256

    e41f1875717e8b0daa341d6679ed078a85dfbf2617618ed5556465e82f89da78

    SHA512

    e3815036892a1ffdc742646901b7312c4f1411209cf031644764f1f561db7978588d336cb3bde33fdd130f8d0dadf2b0057d381090266d57528f0b0abd4d1d23

  • memory/1984-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1984-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1992-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1992-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1992-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1992-180-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2660-74-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2660-75-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB