Analysis

  • max time kernel
    141s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2025 10:01

General

  • Target

    JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe

  • Size

    180KB

  • MD5

    6186d864c5f25345d8c07d31d61846e7

  • SHA1

    74a7582b07a04de1489c0ef1a4c6bf2bb8f268f7

  • SHA256

    35e0e820ca195111cad0cae7538361c3a68eb612552fdf6c476adfc682a4e4da

  • SHA512

    265992f61f980bb4f1fd8fb6b0db91b68a10bfe8b516629dfc49cb7a8b0e9a99b6b420cb5d72ea8aa0a297d6482faf43940d8be416a6caebbfd39bcd20a24451

  • SSDEEP

    3072:inLbgwBa0lI9fWUPHeedkYD+YUz9epd3khvEgsYjMLW1o10n9ZpYdzk:inYwBlwWw154Ipd3R9ES1qrYq

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe startC:\Program Files (x86)\LP\88B4\5CE.exe%C:\Program Files (x86)\LP\88B4
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2964
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6186d864c5f25345d8c07d31d61846e7.exe startC:\Users\Admin\AppData\Roaming\4762C\AA988.exe%C:\Users\Admin\AppData\Roaming\4762C
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4762C\CA14.762

    Filesize

    996B

    MD5

    7a268acf77a0557664fe9e436ddc9a6e

    SHA1

    dbdac5b4f81ced8cf5ab82e1bf99f05a19159542

    SHA256

    2707d01b5cd39a7bf7e90d6d0f408224da425d8cda5c70c3c207acae4ca5fdbc

    SHA512

    f6b0da5f3ef8f6f03cd7817451b10a451bcd2de9ecb34d8d1d50bcd255a21a7c2f030c3683c99036b3a8f9837aed5d39e9fa844c2fd860179f14aafd6ecef640

  • C:\Users\Admin\AppData\Roaming\4762C\CA14.762

    Filesize

    600B

    MD5

    d7263468b0cd458ed9eb77cfb1fda92b

    SHA1

    b387422f148c71cd91010e2e80680689420d47c1

    SHA256

    30d40dd5db863fe99bac7e88049b505cf01a4e23da0ee63a94575120b1e8cf0d

    SHA512

    8bf0717c5138664805d9f28915ecbb49b9aa06165aaa90eaf37f10628c5933810ac43901eb4bca2d5f3074f7d66c71352f95575ec5a56c58b6d233b05fd6eace

  • C:\Users\Admin\AppData\Roaming\4762C\CA14.762

    Filesize

    1KB

    MD5

    131aeef0dc4a66fb9293410849e60a62

    SHA1

    a9e69ad8679c4ad857ccd4569777ef83f7a3a7cd

    SHA256

    3394fc03430f2dcf3eae3cc4c475d7fd0e39a7bdbcb71f80d1be9a78da5106c5

    SHA512

    533e292a67b8fc2ba9e7b846977eabc6448d882f764e07e99865ee953ce5a38df5072e86888aa71b4d635cc667a93111ff6492d9ed7873825973466ef57bc3ce

  • memory/2592-2-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2592-3-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2592-0-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2592-15-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2592-16-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2592-323-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2964-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/3032-125-0x0000000000230000-0x0000000000330000-memory.dmp

    Filesize

    1024KB

  • memory/3032-127-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/3032-128-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB