Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 19:34

General

  • Target

    JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe

  • Size

    177KB

  • MD5

    4e8ed2e7c364870ac53655f60d33a456

  • SHA1

    3b68762065b5802606224ca4186d94ec7f0cf6f4

  • SHA256

    0cada60a8b5a08ddcc6a833ce8b123d8c6812892ca5f0b0db4e9c911467a30fb

  • SHA512

    8589dcc00dac810c167f2eb7841dd6e2a499f7389f6cdcfa567bd54e21c2fdf9fb00177f66a7e2cfff5a3f34240fd5d10e4f13be612782ed0b43c0489357934d

  • SSDEEP

    3072:S/QZ7DGo+N8emCGQThMZh+OJwbMrLzdS5zYAFD1DQmGswlkmScw:Fqo+NfBGZwswMLZSJYAt1DQ5si

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2304
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e8ed2e7c364870ac53655f60d33a456.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\8BAE.6A6

    Filesize

    1KB

    MD5

    943fe00b38ff5a9f3681e90e0f1639e2

    SHA1

    17fafccb3e920b0edbb3fca04cd4c13d2ccfd55e

    SHA256

    d1d78910de2c3a504de725b0f554f1020024004656ba9034816bd18bbfb715f7

    SHA512

    46f9deed50fb4463106c4d74a8b3b5b423c5bd7a1a37638160a38ef4a69b332aea20746ec496e7081f00d0b09c70a69eb8f86cedf1ae6a971498c7fdd48a4eb1

  • C:\Users\Admin\AppData\Roaming\8BAE.6A6

    Filesize

    1KB

    MD5

    e52d9891c53eb2367e89c700b03207c3

    SHA1

    e3e99c2ffa89a8d4fc6d169e0461581b7c6ab51f

    SHA256

    d2497a80756bfa9ea4dae4b33325d9379a840e376c075f3ec23ce1b7ac302427

    SHA512

    e5db7e0e3b1410a286bc8c7a58b043895971dacdff2182f8e855b12e99cf592e6c505e4962d6a7a9c171000627a8015e040cd11d12bc329786e5c8e456542630

  • C:\Users\Admin\AppData\Roaming\8BAE.6A6

    Filesize

    600B

    MD5

    7b6d320ce0385ec6f0fd15752f688724

    SHA1

    5963ef6dc7ba51078bc16c21957a1baf7ef4ba5b

    SHA256

    075be43e9c2b48de26283b622dfa3578e60e0b2556a8aad132a88e73e2528747

    SHA512

    ac53068714c5051b574585a22694fc06719a2f3aea39975bfe9db0695c1dfbe7b092aa54770fa14c3abbed261593c3f23aa10f92131886d19675da044eb774d4

  • C:\Users\Admin\AppData\Roaming\8BAE.6A6

    Filesize

    996B

    MD5

    9ae7a520c65064321085d64ef5a55213

    SHA1

    c74240a8d757df4418a7b1cba25a498f30d3d1c6

    SHA256

    831c9c7fca2c2a222dda5b5b3bd12b6e8b3020d1ad649eb9458cf0d1e123722e

    SHA512

    fd7df8914199fdb2836e9453205b212ec8bb473e4fd0b211daabc62e43d4eb05e1f71b047f9696be21eab358ec985046cc7ac115eb7cbb4076e28ad7a9d8040b

  • memory/588-80-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/588-82-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/588-79-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2304-6-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2304-4-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2304-5-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2672-14-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2672-1-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2672-186-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB