Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 15:13

General

  • Target

    JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe

  • Size

    192KB

  • MD5

    40e01e24f7f6da6f3a53da50e54f9187

  • SHA1

    a4f70eca299a2bbe9c238d3b35ba6eff0e7c7fbf

  • SHA256

    d7e0f5af93d083b9346ee2c4cd6b972f2c597b14fe4d4e4db8eda5b4fd30a802

  • SHA512

    bd0e6bc15b73f59b154dcbd003510fbe2ad03ecc8bbf3f5bad830667e9f742612c521d5c010f6ef1bbc881c7fd6d2aa761188a12062fecf809518e03d3ee13d5

  • SSDEEP

    6144:UjW8x6XKUCuxWNLw+i8qo1InMybISNqm5:gxApW18bL5

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1152
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40e01e24f7f6da6f3a53da50e54f9187.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\C00F.882

    Filesize

    597B

    MD5

    abffa1a36e845bd332b16af686ad7867

    SHA1

    8c98daaffb08e24f1c30ab4f4851d5c732241ea2

    SHA256

    db80f640a5ad7af07938abfec9143c3d3421fa521e250f8e375d31dac4696de1

    SHA512

    516b34d6507bebef41d07f84005b21a6ffbdf2381ac024a92873b64e79ad5868d891fe4a596f8092e77fccf7d741e82619f05bf3dc26028d4a7a455b80793fdf

  • C:\Users\Admin\AppData\Roaming\C00F.882

    Filesize

    1KB

    MD5

    a4dcd3b986351041fc4a905d287cdfe1

    SHA1

    1af2449f099111f701f40397ed28b297694bbd35

    SHA256

    c5553fccfcd862f531e78cad2b5fc7b943e6f97c504a0846d2d76700dd9c7992

    SHA512

    70219a5ffa1e7f70b16af1c7db490b4b3c423d324293710dda6f244285c5c73edca57e2cc553cce0f2bbc7e6f946f504d71e079f8922c482e7040d6817d7adb8

  • C:\Users\Admin\AppData\Roaming\C00F.882

    Filesize

    897B

    MD5

    204f8cc7efa96078ff3c6a120ef56e60

    SHA1

    fd5a1e6e07a0f8449c62e91a4842a4282eb94a42

    SHA256

    5aa946bdf2718379fead7b0b292c174fc14ddc36804e21fd59a1ff421ffec6a7

    SHA512

    89a08ba90bdce4b710dd0e6b391b1e7a4dc09289898faba479009168962c7f523e97d6c9fc50a2f470e2e1241880be2600581cc3d858ef46029459bdddb9d15c

  • C:\Users\Admin\AppData\Roaming\C00F.882

    Filesize

    1KB

    MD5

    fc059723af6a0ef150e4c7ac60277cc3

    SHA1

    2bf5c757f1ffac49e6e08ab659625a40d0f6fed1

    SHA256

    5c7242ad02e0c61038654d9c906ca373446f3fbd4e0eecef8dbd8da537bfb12a

    SHA512

    1551d30c886e59b54866296552dd120d2eb6a2a4342d0ee764d4c933addef00d577fa0d5591ac22173b6cbe5ce1b57cc9887d8eca3f86278c996bb58a681284c

  • memory/768-19-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/768-1-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/768-2-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/768-173-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/768-202-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1152-9-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1152-7-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1152-6-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2672-81-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB