Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 12:31

General

  • Target

    JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe

  • Size

    182KB

  • MD5

    3f988b87a302eaeaf144e47c873a996b

  • SHA1

    f6fd1d58d5c418e248389a9eeab068f801564053

  • SHA256

    1b7b3d299cf781d70114c181b33de22d47bf20e53106c28969e83cc8d4e9b3b4

  • SHA512

    385176c703cac543225a292128f329e33c0fcff38a5e1fef412e081d6c8abb0c4b9495b0457b4e2d0cf581c970f69509b4bc053d20c091ef85fdde97593e2c28

  • SSDEEP

    3072:CupClVC5JKgLsLicBGBGwlnwASgDnkYb6HKbNsrXpc:C9l88gYBa5BTm/e

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f988b87a302eaeaf144e47c873a996b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
        2⤵
          PID:2624

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\9F0B.B3C

        Filesize

        597B

        MD5

        f9f6b9dd612fb8d11afc4d856fa1f432

        SHA1

        24ba8dee6431a4fae9c41ddd0ed5f8885c4e1ba7

        SHA256

        3a4c10210ae8b7a588245520df1712594e0dfb3249373375df7768ec47deb812

        SHA512

        cca732902ea8a1d02e9e2d694771166074e3ee72b22863aa168366d1995eb197b01bd65094ad4356ef9884714c48ef4ff938bb02536833a62470cd54ef06ca93

      • C:\Users\Admin\AppData\Roaming\9F0B.B3C

        Filesize

        1KB

        MD5

        2a8e71277b6662281a74851c8aefbdba

        SHA1

        3efef248037b88da25a3ce055578f4aa90321039

        SHA256

        61c87a48bc98f9af0b5c769298b4837498ccda4705a90ed590810ad1698d298e

        SHA512

        1596ad73f9cadfe262a00692dd88af0266ffaea1ce8554dc300c2a7e56c41c0735cc95b4de4227d3f73d5e15758868ea1f9ca2929858bb2fb69270055d34f659

      • C:\Users\Admin\AppData\Roaming\9F0B.B3C

        Filesize

        897B

        MD5

        da70c5a263e9177c3f0aaed3523c26c7

        SHA1

        ac24478a82fc334153a21a1d2a6229895cc76096

        SHA256

        227f72b05148da42ea975238010a490adab6e3338b47835905b9ff7c8aa1a61f

        SHA512

        57ff359fe9795eb2025107ab5f3fabd00f23f04ae09a9345f15ce1b3f14d373781a3a85d94dfd05e6decff1a33d047f19a43d3583429363e174ad2458821f0a3

      • C:\Users\Admin\AppData\Roaming\9F0B.B3C

        Filesize

        1KB

        MD5

        722330e3ec5415c3c5287dbced44e113

        SHA1

        236e1a3286c8b60d425d3a875d1e8dee51666e41

        SHA256

        f0767dbed4a250ca3cd1166c00f5955a5d37ba8a8196328598624e625e30571a

        SHA512

        592165213436e9d1c47e67cbf782da65a93aaceb620272451fc15fc0a79a931ad9c7164e5d0d0a73c68e1a5f797a9d4b60520baf60e59fa19d7dde26636b397e

      • memory/2080-18-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2080-17-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2504-1-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2504-2-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2504-19-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2504-196-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2624-87-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2624-89-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB