Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe
-
Size
273KB
-
MD5
a9917de225e866104f0a14979ce59ac4
-
SHA1
598f4faf694e445e1c82bb1411da2c6ecf7f1127
-
SHA256
592c6c01d9387508a474186e1536434f0010f0163079ac53bf062a8d822c744a
-
SHA512
7bae3e6220cc1a8fabe4dc59b3f3abd9dcab688ec6f53a1eb91664d6d4a5cda66bd50d305559afe9cbd4204e0011595408b1855dbe37639c704b57123f33bb8c
-
SSDEEP
6144:mRbYRgvJYh2VNRS0SY17RLlcezaDb93WMYUmXBWsImZRbYV:eYRgvJ7zRS0X17RZWDR3tYUmjP
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2764-13-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2764-14-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2752-19-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2296-165-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2764-166-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2764-294-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2764-299-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2944 6F56.tmp -
Loads dropped DLL 2 IoCs
pid Process 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EB5.exe = "C:\\Program Files (x86)\\LP\\9A6A\\EB5.exe" a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2764-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2764-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2764-14-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2752-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2752-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2752-19-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2752-108-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2296-165-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2764-166-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2764-294-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2764-299-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\9A6A\EB5.exe a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe File created C:\Program Files (x86)\LP\9A6A\EB5.exe a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\9A6A\6F56.tmp a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6F56.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 3028 msiexec.exe Token: SeTakeOwnershipPrivilege 3028 msiexec.exe Token: SeSecurityPrivilege 3028 msiexec.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2752 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 32 PID 2764 wrote to memory of 2752 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 32 PID 2764 wrote to memory of 2752 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 32 PID 2764 wrote to memory of 2752 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 32 PID 2764 wrote to memory of 2296 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 34 PID 2764 wrote to memory of 2296 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 34 PID 2764 wrote to memory of 2296 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 34 PID 2764 wrote to memory of 2296 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 34 PID 2764 wrote to memory of 2944 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 37 PID 2764 wrote to memory of 2944 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 37 PID 2764 wrote to memory of 2944 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 37 PID 2764 wrote to memory of 2944 2764 a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\AB3B9\37C9A.exe%C:\Users\Admin\AppData\Roaming\AB3B92⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a9917de225e866104f0a14979ce59ac4_JaffaCakes118.exe startC:\Program Files (x86)\B9692\lvvm.exe%C:\Program Files (x86)\B96922⤵PID:2296
-
-
C:\Program Files (x86)\LP\9A6A\6F56.tmp"C:\Program Files (x86)\LP\9A6A\6F56.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD583501b9ebebbcbe2f60f02bdbd932a0e
SHA1cfcf43d08261f4e263dd4ad53b55c0ea1507ee5c
SHA256c172754d1d1e7224ed84e626ad4b8802f65746e2c432943ec454346aa70485d3
SHA5120865da4cf4fc6e6f4664a73f2a7d9206e6ab8d93a4a5486d49bed66b26a62b53e36343bb93d162f35a00306aeea6a1da8e56bde70dc911701666ceec7d9b0c43
-
Filesize
1KB
MD5906d598db8f7d0ad37481c953bd8d235
SHA1a99c7d970f09b9159bd2c4fd260816b3ca235fcb
SHA256ddf0c54a99c06fb8240763c4b2c148a2f674498f887092e912782eebca872c42
SHA51213408d867a74afc947d2e4dbbeddfac67a3e5c4bdb917c4c27f6d053ec8380c312cdfdbf5529e745c627c1f81cdfa9d7efefe2bc6a599c32efc1280a0b59c7e9
-
Filesize
600B
MD5a5ebb54bfc4ab8ce8c26b3407d69c8d4
SHA12f39163328b825e1345c780fc54d1f0236b5cb01
SHA25607e84a4e791be583cd081f33527257afa33820e72157a998212557c36e2781af
SHA5127ee6956dd4d1998d6478ff21ac3151cd8df5faa2c7bc0a0f3972b9bf0354b7f94ea2d5d14e5f14ef1818c5889870d81abdec5ffd8f828221ae2e745d1b114fde
-
Filesize
1KB
MD5ad9613692a450c76da09bf9ecd0a3491
SHA1d5531a45099ab9476891b725669f5591014d36ef
SHA256fecfcbd3ebf636eab77dd24c5129dca402946cd6811c3013e9aaa5548901cd3b
SHA51275c2e955283e559165ef97e38af3d1f4f0391eae69bf40e7b1864f1c6d9e0f826920c48b70163f2cce811011c66994afabc724e3b7289648fd8c530d7294aa22
-
Filesize
97KB
MD5b5ea3a02245a0dcead8fab5351d1cf81
SHA1cf63d395d4e9f658ea3e73e0d9407dd4dd3aedf9
SHA2569a9a5d6cbd12bfca01c9f5bf0fb16b750815c54ed99c81f387578e05efe2dd88
SHA51259e0c251aade2dae3fa228aa0fc31c1ce3a29a17d8c7267db8fb77dfbaad75da8d1766c514088726d3c9df8e7ff7679151d099cb0123deeb2cc585a0b84a46fc