Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 20:13

General

  • Target

    JaffaCakes118_975f564f04afa41186f64eecf105d1a4.exe

  • Size

    159KB

  • MD5

    975f564f04afa41186f64eecf105d1a4

  • SHA1

    4b2fd3fa1e7367c9f25337c19c8c42f185024c16

  • SHA256

    04bd328544ac52d322ed83deb1c98e895a22e8936c0b0f49c2e541d27a420249

  • SHA512

    72283d0e29078424bfb302044f2cfada2331e0ca0ed3b612b93a6fdc4322478a34cff59b0a85a0006c5d92dcfc898c275fa371238c352ca2efd7dbfcd05df4cc

  • SSDEEP

    3072:piUyvp4hVLbutToP751vSOAPl4Ek6sJWyt5PD6nr0foJgG:cPvAVL62P7PbWy3D6n4wJ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_975f564f04afa41186f64eecf105d1a4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_975f564f04afa41186f64eecf105d1a4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_975f564f04afa41186f64eecf105d1a4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_975f564f04afa41186f64eecf105d1a4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2516
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_975f564f04afa41186f64eecf105d1a4.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_975f564f04afa41186f64eecf105d1a4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\5474.F86

    Filesize

    1KB

    MD5

    a0517b0b3d82c17d29215ac92730d543

    SHA1

    a7d4eaa2f576e32eec7a1faae210c6c7bc1b3153

    SHA256

    4ad19ebe4df80c122821e845d77ac0eed6d83ca7ba75e585512c61c093f75908

    SHA512

    049eedd158795bf72530a7148e3cd592d0492a736b46c07f7210599357e756ea31a0cc48f718fe08760a5e971486db0c1988cad213866097dcab1e11a527826a

  • C:\Users\Admin\AppData\Roaming\5474.F86

    Filesize

    600B

    MD5

    9446b12672df00cfa78a7b24846e624d

    SHA1

    b7e76aec1b468aec0285104db411e330af35241d

    SHA256

    4db55b507710e87ddce89bbb6a2c2afe9089a0b8497bd43d43123d54e94d4440

    SHA512

    3a3e8b5f404b95dba6bbe5965d670ad0cf73aa2a8ea83a8fda6e61c37fbab7cf6a4e5c2090a97d60cc24905dc1f64d9d123a98f63782b0dc09e7af0a29091961

  • C:\Users\Admin\AppData\Roaming\5474.F86

    Filesize

    996B

    MD5

    b82ec81baa0ace15b6bb23ff6e1600be

    SHA1

    0e6ec2f9e255b05f08596ea9c3cba5b4e7498e8b

    SHA256

    4e022d7c4f092fbe5b77ab40a8586d5f1a5f18f5de4bd28eedf88a4843e841f8

    SHA512

    860029d6779c097cd87670f813cbb6720de66e4f934a0c22bdfaf2b8347ad14b4508f069a2b9124418ab5930a14e103f0d3047c2a25571ab368ae88e73f09f4d

  • memory/2356-88-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2356-89-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2356-91-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2516-4-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2516-5-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2516-7-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2624-1-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2624-15-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2624-196-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB