Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 17:48

General

  • Target

    JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe

  • Size

    174KB

  • MD5

    a0d8a6d05e49d40dcde008467422135e

  • SHA1

    fc8a6f42d9da69e1dde86568b4efef612b575f3e

  • SHA256

    63937432ce8cbce3d93cf782d5d568b342b491a3a3a5c804ba17c59e66afdba9

  • SHA512

    3a05a5e52ff5aff1730822d2ad6a5b3609f05d1233dbea519316c404fc07e0bb3ee03bffe3bf47fc1dfa9f955461d72a5ddd150bafadcdf703b06baa84dbf2a4

  • SSDEEP

    3072:v1wKJ+803oJr5d/JWunRd1obDUkktXvIZ5P2i1:vm0+803oJtdht2bDUTt0T

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3044
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d8a6d05e49d40dcde008467422135e.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2452

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\0F4A.57C

    Filesize

    996B

    MD5

    bd55c41a26469f99b1d7360dde69e646

    SHA1

    161ae148b6662eef0d6fb80e6cf118ad86c7f684

    SHA256

    eb51ac25400b2ae71a013c36fec2a32f03bc65ec5e9f4a40d58aeec11a50e1da

    SHA512

    eb773be9ea052fff82d8928f9ffdec098731cb88c20d656c9583cc2664e7d8046dc30436867198f4a7a2f3db8ee9ed589b07c1cf59f4892a11cc1b9ba2574b05

  • C:\Users\Admin\AppData\Roaming\0F4A.57C

    Filesize

    600B

    MD5

    a88d38c0e85a7b05acc262d1600a5495

    SHA1

    ad229c7c58da116b9f236ac839658f161ced56ed

    SHA256

    aa11bd61cf06e45c9adb09ea0e17a28675e0adf7b90696f4a2a37103b37e676d

    SHA512

    97ac90e2e12c90500466ce858ada6ed85fb25fc4c31ec74afe40910e0d50e2dd4e024fe234166c87d99bf136da64ca3e6e3b6c792e20a6036f3f7db8150dbcf9

  • C:\Users\Admin\AppData\Roaming\0F4A.57C

    Filesize

    1KB

    MD5

    fd77566b8fb69571035a5ca3dcebed92

    SHA1

    a136a26ccb7bf836edcba426c465ea821c3951c2

    SHA256

    d3816ced73717a2d0ee41d4bb987e9fba3ac3067e13c6643a4868f37e98243bd

    SHA512

    a6b75cc7c7a8fa7b3746f2a973e4d974137169348e266d7bceba3cff8058d97281e805e1c68c74a46d1cde18fbdfb460495a260a0cce179c4119f634284bc5b7

  • memory/1384-1-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1384-2-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1384-195-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1384-48-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1384-111-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2452-115-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2452-113-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/3044-10-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/3044-8-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/3044-9-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB