Analysis

  • max time kernel
    142s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 04:53

General

  • Target

    JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe

  • Size

    174KB

  • MD5

    4712593ccdbeac886024d6aaa5172b21

  • SHA1

    4b354b96e624f8ba14876cd358c4d5202ecd289b

  • SHA256

    618bbba57f1cc3ec7bbc4dffa1ed9a626141443ed7933c284f90019b70c8ea92

  • SHA512

    9b3797700fbc7d1dcf38484f63cd16933df231e1fb6dc91f795532afc5168c240b65e32b5ee42929f1f1c895b67758979f1207681c2df7c6f64051ee291a89e6

  • SSDEEP

    3072:LO0iK2/TuDH6w/KycOtx0OaUI07WJ30gI7E0sy1wiZwhAlvJul:LO0iKguMx/ODI0aWgn5iZwWsl

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe startC:\Program Files (x86)\LP\4B04\561.exe%C:\Program Files (x86)\LP\4B04
      2⤵
        PID:3272
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4712593ccdbeac886024d6aaa5172b21.exe startC:\Users\Admin\AppData\Roaming\49A26\5794B.exe%C:\Users\Admin\AppData\Roaming\49A26
        2⤵
          PID:2324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\49A26\6D71.9A2

        Filesize

        596B

        MD5

        48fd04b5c640c33e655f5cbd2d89e79b

        SHA1

        2e8fbd83612412f7a86f09d44bf5a004496861f8

        SHA256

        7dcd595250cd7307d8bbc9a2f3a2c4807935225b6ece474f97c78b1e105d584c

        SHA512

        99ced056f1a6a9f4ea7b6ecec739972951832ec1aaacb6d044947768e6b42860c62c7d894c7b8d1350172f19cd566232958d4fba494eba13a5de63efc9b70928

      • C:\Users\Admin\AppData\Roaming\49A26\6D71.9A2

        Filesize

        996B

        MD5

        fe63b072b92338c9a0af923ac29df860

        SHA1

        e40d5107e442fab6bea9cadd89f9acbc886d616e

        SHA256

        45991fb0d41047dd93e3064816abfb02ac8b9d0443fbe61f758179332da12de1

        SHA512

        b4839be220bdb54b23ae1923602d3ab9b66468aaf1d1dc63dcb9cc6b8cfa959d7ee81a10fb2bae9c18d65fa12654e84a680c72d4ea11b87fd7e724bf15a05d4d

      • C:\Users\Admin\AppData\Roaming\49A26\6D71.9A2

        Filesize

        600B

        MD5

        e180d51e3606a6de6e5a18df97bea6ae

        SHA1

        e505ac4e3270fba105461781134d339e96ea58df

        SHA256

        89775b0115cc38696b421a4381698066f1b1e7ebee1e6f55b87c09b84bd452ac

        SHA512

        ee04c0b72c274585b8b0b6c2557a6dc371507af6c4e308911e0135f253eb305238f98730ed3e8785a6833fb2ec745db4eb478a531cc62350f09ea099842a1a50

      • C:\Users\Admin\AppData\Roaming\49A26\6D71.9A2

        Filesize

        1KB

        MD5

        650ffb476b7f3fa1474eb2630c450d23

        SHA1

        f8d724ca0f79732a34e58df34fd4c90b6e4bcccd

        SHA256

        d799250670f81b9612df5f395bead0ac379499819d9c79f696134b71372012cd

        SHA512

        53598ae39e3b3dc43d31cda13d4f1724b676e753f640f9a698e50c3b34b343175436ff497b29080906e9e8f795e32f2f192f6e1d431ba744cb41292738cfd30a

      • memory/1984-15-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1984-0-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1984-16-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/1984-2-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/1984-3-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1984-302-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2324-134-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2324-135-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3272-14-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3272-13-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB