Analysis

  • max time kernel
    143s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 17:09

General

  • Target

    JaffaCakes118_4d4b1bc9e686d0416d836dfaa3875b4f.exe

  • Size

    188KB

  • MD5

    4d4b1bc9e686d0416d836dfaa3875b4f

  • SHA1

    cd4d74c72dec4cdc3e820d9880b6aff3bd077cab

  • SHA256

    adf97f7bdffcb4e2a36ab6996533b3f175bf85203cd414ef39e100fff5ae7c15

  • SHA512

    27c1ea6dc34c7f74ebe5d8991b478dc184f7ff1dbe489db3df02c7b49fa36e0922f27db2fe380e9499a9e3683bdc9473ca18d34717156460dbe1114cbfa59b52

  • SSDEEP

    3072:y/59Bv2ruJQ1ylz/POFgqJheF46qL3Z3f//OoupzQfl8i9j:y/dvGg0xnem6GZfexpM+u

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d4b1bc9e686d0416d836dfaa3875b4f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d4b1bc9e686d0416d836dfaa3875b4f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d4b1bc9e686d0416d836dfaa3875b4f.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d4b1bc9e686d0416d836dfaa3875b4f.exe startC:\Program Files (x86)\LP\DDF4\317.exe%C:\Program Files (x86)\LP\DDF4
      2⤵
        PID:4484
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d4b1bc9e686d0416d836dfaa3875b4f.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d4b1bc9e686d0416d836dfaa3875b4f.exe startC:\Users\Admin\AppData\Roaming\421B3\846DD.exe%C:\Users\Admin\AppData\Roaming\421B3
        2⤵
          PID:1424

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\421B3\3712.21B

        Filesize

        996B

        MD5

        4c84859edde00bc87b9c0ccf487f13ee

        SHA1

        54df1abfe209c646801f47a3b3bf90b35756f0f7

        SHA256

        c39df60fb5335812d521c008832f5e55e8c9beb5c1a6b56af1899ebf7507450c

        SHA512

        58c5f7f404f514ca2a86f6ca5fc244d0590ceb6ecdfe2f7b2ab7888b92cb78b24209d6dbb1fdbad40675cc107fb93220b866647514c7f29fbe8609dd4cd68c08

      • C:\Users\Admin\AppData\Roaming\421B3\3712.21B

        Filesize

        600B

        MD5

        aacb54a1b7f32b510fc184fc03525b18

        SHA1

        a67ec1ade676148135825360229d246f06b536a3

        SHA256

        2bf62549654bc9645f4dcb3ebc0021561a90136273a8e398d31074713b6add1f

        SHA512

        14468ce626badcb8dfb68a76b49ac26e9634857b6cf12b82afb16f08e27cfbc8f9ec3049d1786cdde0dd8951c502ecd70548517ba6146edb3ebdbfa527e0bb34

      • C:\Users\Admin\AppData\Roaming\421B3\3712.21B

        Filesize

        1KB

        MD5

        a94282eab93c55184d9b6f5bc77a1007

        SHA1

        0cf6984961ecef61273e1999eac77220a97acdf3

        SHA256

        77afc2b23b12dc1102649082a9e276b3e454399d84b7904fec10db5ba22996af

        SHA512

        a034238c804a668b4e99b6ea7b2026f872a29f59ed58ab1c477076b7616fb48630a6cc2903051e55a80e08c00abe920d27ce3919cef47f37bd7490ce1ee7b7e2

      • memory/1424-117-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1424-116-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2928-14-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2928-1-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2928-15-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2928-2-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2928-264-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4484-13-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4484-11-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4484-12-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB