Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe
-
Size
275KB
-
MD5
b0d8f62c87326677139cdf0e7a32129c
-
SHA1
7603646e2b4e56ccf76edd8784e19c50903b546b
-
SHA256
afc7d802d315041e52e6db567f3b79fa90142ab0cfbf0e607025cf9430cd7fbe
-
SHA512
448c0678b3b3b2604877748a2ad87548d517f707dd6ccb289f248804dc22c3095272a59920a4b19dc5a459e50be8149418ba728e107657fa08fd5fb8d37bf24c
-
SSDEEP
6144:cq6BgbtPC8jEOSMTYzN0qmrPznd8m+wjKaudJEGx+wyYtPCYjVsyA:i0tPC8jE0IGXvnT+wjhLYjVsj
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
Processes:
resource yara_rule behavioral1/memory/2544-47-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1104-53-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2544-49-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2544-150-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1656-154-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2544-329-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2544-333-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
3765.tmppid Process 2896 3765.tmp -
Loads dropped DLL 2 IoCs
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exepid Process 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\828.exe = "C:\\Program Files (x86)\\LP\\3DDB\\828.exe" b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
resource yara_rule behavioral1/memory/2544-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2544-47-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1104-51-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1104-53-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1104-50-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2544-49-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2544-150-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1656-152-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1656-154-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2544-329-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2544-333-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exedescription ioc Process File created C:\Program Files (x86)\LP\3DDB\828.exe b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\3DDB\828.exe b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\3DDB\3765.tmp b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe3765.tmpdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3765.tmp -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exepid Process 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid Process 3008 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
msiexec.exeexplorer.exedescription pid Process Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeSecurityPrivilege 2720 msiexec.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid Process 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
Processes:
explorer.exepid Process 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exedescription pid Process procid_target PID 2544 wrote to memory of 1104 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 32 PID 2544 wrote to memory of 1104 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 32 PID 2544 wrote to memory of 1104 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 32 PID 2544 wrote to memory of 1104 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 32 PID 2544 wrote to memory of 1656 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 34 PID 2544 wrote to memory of 1656 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 34 PID 2544 wrote to memory of 1656 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 34 PID 2544 wrote to memory of 1656 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 34 PID 2544 wrote to memory of 2896 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 37 PID 2544 wrote to memory of 2896 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 37 PID 2544 wrote to memory of 2896 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 37 PID 2544 wrote to memory of 2896 2544 b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
Processes:
b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\B9911\AB23D.exe%C:\Users\Admin\AppData\Roaming\B99112⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b0d8f62c87326677139cdf0e7a32129c_JaffaCakes118.exe startC:\Program Files (x86)\11CEB\lvvm.exe%C:\Program Files (x86)\11CEB2⤵PID:1656
-
-
C:\Program Files (x86)\LP\3DDB\3765.tmp"C:\Program Files (x86)\LP\3DDB\3765.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5bd7106f095993023c73b303e7c875977
SHA14fbe0e14cf1309dd184ac019001c1297548c68cf
SHA256160fbba5cd1e390b80f50b23384a91a3b9e6c93087555e9af680a43f3014ffb2
SHA512076de604675e5c7277a9c44ef4370703f42c28982f038806cfd20049a88476d3542ea3eff19e851fd22dda11da015b5d824ee0475c09468628160c652c179c21
-
Filesize
300B
MD537c037edb1ad4c6a2913a2e3cf431641
SHA18b8cf2535091c49773a0f091d292f9c4b676aa39
SHA256d4a36f71e2430431442c21374a48eb49905df3bd548108b48d0e8c42c51dce36
SHA512ca9ffa46d5d8c944fdd490b2c3cf6baa13ba77847ccee06f0a49dc89df0991a2fe0484e89cb7101edd6623b3cb2e07e6da0f14b7c498a29ed4ddb299b758093c
-
Filesize
1KB
MD5c14bda56447d8fe9800a3c18c5e3be6f
SHA131a9fd82f86dea0c05dfd38260b37f81d89da29d
SHA25692fa94910a31f1eda6151454106ea98152105aee43d69734fabb6297971b8f2c
SHA51218797a4ad63ec6142868561cd53d8584dbecd9f840e02b4b84262176c74b744931f044a6a9916c8ddcc4777070dbba94a5a416ebd5f55b46cd0553767f5c9be8
-
Filesize
600B
MD52a57af6bfc5923f78dd6079af6845640
SHA1b664e94915249b4eb076447e4154eec218a76c5f
SHA25697dc974d59d8ac26b519a6c5dfa0d203b45ee4c42b356376208ea3f7a93c9418
SHA512dd26cdb30ef04f3239a2ff50760bd7be91f10d782b07941145317a3568ce66ee732d77829a0932e6b7e2dee6a35bc8441ef27c99559744c1ac0a49918962a864
-
Filesize
96KB
MD56ba667fcc1121648c1134fc855f1f188
SHA1602dc1d3fb5ae37175272705a8e33f0c4b8613ec
SHA2562a9ba04dba263ede7ffc0f73cd189d08424f71b776a189b104fd2b886eb9d4bf
SHA512f58ae6ce033159ffd2a1ee76313c050bc9f585f49571b6e44938f503bd3fcc4994e996e6736626e714b8b3c1d91b83112693a5943b2f195e47e320f7e894c7b4