Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2025 22:33

General

  • Target

    JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe

  • Size

    172KB

  • MD5

    6e7cc9d832b8e4dda93784898e96191d

  • SHA1

    a8b3bd573fb29e13bfeb6988a322a520591874d0

  • SHA256

    dd5a4fdea9fa94e6535803867990352151b51f3d9716be66be8282382e4bb3c9

  • SHA512

    4ef75f30770e3c4078b61ffbce0f4032654352155cc9f96a20f5d587a004a17899628bc9ee30a649b0dd1753025b7a72ff378aa1515cc9d5c92a7080f731b0ac

  • SSDEEP

    3072:VOVje/W2l0W1JZMwspmwwvjRaoq+0z0iIdCMCuqm0cAWoXAaGTVZQDghQqsZitRx:VOVjeO21Jitmxq50/djFpoQaGLtsZitb

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe startC:\Program Files (x86)\Internet Explorer\3A09\54D.exe%C:\Program Files (x86)\Internet Explorer\3A09
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2712
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc9d832b8e4dda93784898e96191d.exe startC:\Program Files (x86)\84B13\lvvm.exe%C:\Program Files (x86)\84B13
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\92384\4B13.238

    Filesize

    1KB

    MD5

    d21d7514e001d4d61c7c4680cedc7d11

    SHA1

    97a7cdfc37796560e9ace186a28e023287e1e79c

    SHA256

    5b8fc4dd58ee15f2d5291215f8cbc230ca12c431cfb6d4b4ffafccda30fe6d9b

    SHA512

    a2da625fd08226f12c75d8dbc235212357b233be41690c201d1ba2f3e9c54d0bb87213ebe56f546c58bc2256c23827a3b116e3e2cbe8264b677d62a1f375f01b

  • C:\Users\Admin\AppData\Roaming\92384\4B13.238

    Filesize

    600B

    MD5

    8bf2a150e1cae666c721130caad40415

    SHA1

    6ae08d90c5d4091a1d793add0c8121429804a6b5

    SHA256

    9da2c895c291a25738a584df228629fe48210709ba9d2dd6b9aff8e891d66ad3

    SHA512

    30e860f446c08f091d072306da8d5574cc0d9bc1f4ea2b749b83f1c4e9e5472a2214b85dcfb0981a20e8a2a8fff5903c37abaf9f60876b7d943e161e5519662c

  • C:\Users\Admin\AppData\Roaming\92384\4B13.238

    Filesize

    996B

    MD5

    03075797d017aa77c48af5eebbe44a45

    SHA1

    da8ff294b7781b394bfbba3480054d31945a1a7c

    SHA256

    412354a7dbb99d9537d83821e921965d42291ab15714911b2635483c1324998b

    SHA512

    e6814bf97697f6343cf6408dea76674c5f67e5b4e995df5d88a62d9ff0b95d8a34182834aa3fb2262554327fbe3f7122bfe55556903b3d9cd130784c37f1a5c8

  • memory/2176-83-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2176-84-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2700-2-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2700-187-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2700-1-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2700-15-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2700-80-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2712-14-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2712-81-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2712-12-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB