Analysis
-
max time kernel
140s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe
-
Size
288KB
-
MD5
a6aceafaffeaceb9eafc8c3349d00a90
-
SHA1
3270d039ebf2ee5f7ed0da3d4821b255a4682b00
-
SHA256
69e40c179d08bc3702e977affd3cad6c2fd7c2f295e3ef487ce4958d3f1ada27
-
SHA512
3e729b575638f558e0b9be70fbbc44556ca1b9707446c4dd0179e1987b03e10a75e52e1accdb80f3b974af5e94f5b2e5b63531450838b0139b94b5a179ebbc57
-
SSDEEP
6144:HfcV6p+EUfK2H70JazuPj6VrQqN8bO581acJW6:HsRlR4wzWmV0q6O0X
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 9 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2256-3-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2256-4-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2256-13-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/932-18-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/932-17-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2256-156-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/3064-158-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2256-298-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2256-304-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1796 3CF1.tmp -
Loads dropped DLL 2 IoCs
pid Process 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\530.exe = "C:\\Program Files (x86)\\LP\\D45C\\530.exe" a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2256-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2256-1-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2256-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2256-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2256-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/932-18-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/932-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2256-156-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3064-158-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2256-298-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2256-304-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\D45C\3CF1.tmp a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D45C\530.exe a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe File created C:\Program Files (x86)\LP\D45C\530.exe a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3CF1.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2656 msiexec.exe Token: SeTakeOwnershipPrivilege 2656 msiexec.exe Token: SeSecurityPrivilege 2656 msiexec.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: 33 1884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1884 AUDIODG.EXE Token: 33 1884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1884 AUDIODG.EXE Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2256 wrote to memory of 932 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 31 PID 2256 wrote to memory of 932 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 31 PID 2256 wrote to memory of 932 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 31 PID 2256 wrote to memory of 932 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 31 PID 2256 wrote to memory of 3064 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 36 PID 2256 wrote to memory of 3064 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 36 PID 2256 wrote to memory of 3064 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 36 PID 2256 wrote to memory of 3064 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 36 PID 2256 wrote to memory of 1796 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 37 PID 2256 wrote to memory of 1796 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 37 PID 2256 wrote to memory of 1796 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 37 PID 2256 wrote to memory of 1796 2256 a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\C26A5\0B7D4.exe%C:\Users\Admin\AppData\Roaming\C26A52⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a6aceafaffeaceb9eafc8c3349d00a90_JaffaCakes118.exe startC:\Program Files (x86)\A5EAF\lvvm.exe%C:\Program Files (x86)\A5EAF2⤵PID:3064
-
-
C:\Program Files (x86)\LP\D45C\3CF1.tmp"C:\Program Files (x86)\LP\D45C\3CF1.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1264
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD51e8e20037c88b1249bb91f2ff29d0c79
SHA1ce3f1e1bccee39e6e9aa09abce93fffdd1240d2c
SHA256b0a7d731093090271a225c70aec1e4e12c7f4147256f2b8621794897d15bef9e
SHA512155dd584ad01f38c7055b529de8c7d1873f4f0bdc31a96a52acd6cdac70f7c6f812c000f9ca9f681005660dc068c42070827b81661ac00124679ed70ef1fa3c5
-
Filesize
996B
MD5e0027994a3e72c1b2b9060065aad83c8
SHA184aa5b98073d590278ccc2fea1cb174e738b326f
SHA256cb01852e5eec267fa21419d40cea95c0ff699ef0a1f784e2030ba98aa5d6fb24
SHA5120edef749fa2ff6be3912ace69638bf24d8edae327a9c33f20b1e5ccf16b56c0b59132f89a3b65c47faa7bf49773fdd63a6d95f5a3b0eaf7acbb18c2ad1b7738b
-
Filesize
1KB
MD55efbf36de84f0b68a9496d3c456c96e4
SHA1c6deefa270a9a10d5451fea0f99bb09cd3b47c86
SHA256909abc943d1da810549e9c5b0115b2868ef1a08f019f249fc94626720a0f591a
SHA5125562bc0fd4a6186ece6041f0503330f9f1b0ff8add8ab20900f520c847a2c1dd5c59a668763dbe1ec5534c5c46532151672014f7d9515e58041eb7c3e6bf80bb
-
Filesize
600B
MD5b0374ed5bc5c83fe0ce2e19ad7ccd11f
SHA1c240b3f3417acf5e6e60015ae2279567368a4931
SHA256431861983e7a295ffacf77809a7cbbb90739ae915176252d3e70c3ff63e273b0
SHA51229b19ebc3f3e0a561059b32670543e24e9d7143e05c2f8f1ed0155e3f439f26c6df967322bd736986b8af1573acb57d2205ad11d67cadd2cfef4aefc7d6d4a80
-
Filesize
1KB
MD504c7ab15c7445e0a0bdc7371b3174040
SHA14b1a0738864c41606414cf1347ca4355f7fb6d46
SHA256fc5d25c7dfed3ca0252c8b903230bf8d8a317705334c1cb5edae0257296c3f51
SHA51248f940c47c99c22c79c64e3952c7012f47f55f827bf16081fbd6264c3c033f8327f787c01e5863b857c56b7890e566a8791f607a394ad26ed08361583e8f6275