Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 19:46

General

  • Target

    JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe

  • Size

    181KB

  • MD5

    4ea7c83f425b958d086c6e149b974a0e

  • SHA1

    6d4c206279b81d345958cef89abfaefd8bb51093

  • SHA256

    4d9069ca45891daa6d531429ad3bef9e8f8ced4736531096cd6ef8ea1d236981

  • SHA512

    5f6c4d9ec9f04d747f77be6012ef093b9eed5c83f26867ef504640420da03509698a34d25ef86f1804d80c3dd5acac772ffec10caf36effee7e93ea397a06a6c

  • SSDEEP

    3072:UrSqBxddn2ypl4dYt7ieXGGXmGnWA1FCDsh8hvU6clb5OGg4p/UQ7S5x/b2Qhl0:zidd22lTieXpWGnWA1Dh8+5b8Gg4941D

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe startC:\Program Files (x86)\LP\5749\582.exe%C:\Program Files (x86)\LP\5749
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2120
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ea7c83f425b958d086c6e149b974a0e.exe startC:\Users\Admin\AppData\Roaming\90C21\74457.exe%C:\Users\Admin\AppData\Roaming\90C21
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\90C21\1CCC.0C2

    Filesize

    996B

    MD5

    39b81b94269ea3629443d64fae5b25d0

    SHA1

    9f18622e87a5dfcd9107736cb49647939f5e4d30

    SHA256

    cf127b47f3770a747e598c29e79a4799257c359445ed29983a7ab58de0b3fa88

    SHA512

    eea075ecba1bdcf42be858ede3112d00fac35a6fef1aa08730d2b1d740f369a84ae5dfbb790646b091295bfe673a1bc6a61bd8cf09d73efe6fb20ba42536db9b

  • C:\Users\Admin\AppData\Roaming\90C21\1CCC.0C2

    Filesize

    600B

    MD5

    e0e8211e508a62a9410a38870d0f20d7

    SHA1

    af33bb68fa7aadde19ffe1f805169623a41ddeac

    SHA256

    f1573202e16a3696383739807b81e471a702556fe1fbdb341c8cd4bed847c3da

    SHA512

    160eb3ec5b98bd4d5471997a6636a8e4c8d1ed46ca8498ddc4cfba079810e308ac1885bc1203ab98e9307f673ba3a76273e619239137aaf51fe3b198453f702c

  • C:\Users\Admin\AppData\Roaming\90C21\1CCC.0C2

    Filesize

    1KB

    MD5

    773417c0b96bfb4a1bd36a54c8f526ce

    SHA1

    96dd52c1902aaef64de613c8e8637e9b1e68dc98

    SHA256

    75c76e697888cc4092285be6ac0c89ff619794a4909b2904fa9fedc757ef17cd

    SHA512

    038814be15eabd064dae0be8aea00e8eca8c3e92561d67e9efd82ffb1a71abbd7e42757617b34bd56f0e6f406133a2b1e8007043103ae7646bda05e115fe7b19

  • memory/2120-13-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2120-15-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2956-111-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/3016-0-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/3016-2-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3016-3-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/3016-16-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/3016-17-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3016-274-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB