Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
b198ccf17826157030f93839b0073334_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
b198ccf17826157030f93839b0073334_JaffaCakes118.exe
-
Size
278KB
-
MD5
b198ccf17826157030f93839b0073334
-
SHA1
2ba5171bf0917bc42b0f3307b02d96fba026eb8c
-
SHA256
cae560e45455ea4fd8ddd3e5a9de9eef9e7bf9c26b1fae83b538ec111e145cc6
-
SHA512
fc3c194d25c17aacb5ccada7c7ed3195a543c735b8f22c4b1a39e2e54df7f005b1c1e521d135cc651529e2f81261582b3dacfaa57061e3df5eaae5af9102efe8
-
SSDEEP
6144:h2xWmwEiSh908fenhnhwNJJ3FQl8gLxq9KuFlqvsqBVSNk3teUF:h2ZrTgnhh6FyrLskuzqEqiY8U
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
Processes:
resource yara_rule behavioral1/memory/3032-14-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1628-15-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/1628-16-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1980-84-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1628-85-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1628-209-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1628-212-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" b198ccf17826157030f93839b0073334_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
44DD.tmppid Process 1844 44DD.tmp -
Loads dropped DLL 2 IoCs
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exepid Process 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\551.exe = "C:\\Program Files (x86)\\LP\\A5B2\\551.exe" b198ccf17826157030f93839b0073334_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
resource yara_rule behavioral1/memory/1628-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3032-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1628-15-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1628-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1980-83-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1980-84-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1628-85-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1628-209-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1628-212-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exedescription ioc Process File created C:\Program Files (x86)\LP\A5B2\551.exe b198ccf17826157030f93839b0073334_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\A5B2\44DD.tmp b198ccf17826157030f93839b0073334_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\A5B2\551.exe b198ccf17826157030f93839b0073334_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exeb198ccf17826157030f93839b0073334_JaffaCakes118.exeb198ccf17826157030f93839b0073334_JaffaCakes118.exe44DD.tmpdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b198ccf17826157030f93839b0073334_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b198ccf17826157030f93839b0073334_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b198ccf17826157030f93839b0073334_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44DD.tmp -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exepid Process 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid Process 2500 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
msiexec.exeexplorer.exedescription pid Process Token: SeRestorePrivilege 2008 msiexec.exe Token: SeTakeOwnershipPrivilege 2008 msiexec.exe Token: SeSecurityPrivilege 2008 msiexec.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid Process 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
explorer.exepid Process 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exedescription pid Process procid_target PID 1628 wrote to memory of 3032 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 32 PID 1628 wrote to memory of 3032 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 32 PID 1628 wrote to memory of 3032 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 32 PID 1628 wrote to memory of 3032 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1980 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 34 PID 1628 wrote to memory of 1980 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 34 PID 1628 wrote to memory of 1980 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 34 PID 1628 wrote to memory of 1980 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 34 PID 1628 wrote to memory of 1844 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 36 PID 1628 wrote to memory of 1844 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 36 PID 1628 wrote to memory of 1844 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 36 PID 1628 wrote to memory of 1844 1628 b198ccf17826157030f93839b0073334_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
Processes:
b198ccf17826157030f93839b0073334_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b198ccf17826157030f93839b0073334_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" b198ccf17826157030f93839b0073334_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b198ccf17826157030f93839b0073334_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b198ccf17826157030f93839b0073334_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\b198ccf17826157030f93839b0073334_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b198ccf17826157030f93839b0073334_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\2DF27\5FDA5.exe%C:\Users\Admin\AppData\Roaming\2DF272⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\b198ccf17826157030f93839b0073334_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b198ccf17826157030f93839b0073334_JaffaCakes118.exe startC:\Program Files (x86)\27ADC\lvvm.exe%C:\Program Files (x86)\27ADC2⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Program Files (x86)\LP\A5B2\44DD.tmp"C:\Program Files (x86)\LP\A5B2\44DD.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5452e8c0fccf57b7ca71cd84b5e44f635
SHA1f65ac46609cc3079142b73628b347f77b0d7d213
SHA2562d4862f7740ff7d939e5f303a8a2aab0e6088e77f9bc113e80c26c4d5a471121
SHA512c13d967585432e78885f3673b3c6e4e0696b4e202a08ccfbaadca16cf75c2ae7ba0a71ea57140b05025d008f81af378084a4743ebb701e210bbf15b71e2e4c3d
-
Filesize
600B
MD51d2abb398d22a66cf4c543baf4dd538a
SHA10148106ea32b6a9b25f6dd49b67c3439fb576deb
SHA2561f5a4ce631c5b7947077c4925eb882145a4d9a837694dc987eff0a0555675835
SHA5127063da28500498cc9741ef88d6d64ddab65091575afee0c45e98341dbd34ee6ca461a6aa113bd8224ada710aaf1ff512f3b432ba84bb071d2a20256556bab118
-
Filesize
996B
MD5091f3d214d09bde08ea9ac91f3abdd39
SHA1867dd797771e1d8697e161c741c59499362b97b6
SHA25643a9cc2edd8c3449d431141c0e2c8dd00d25b7e1f4c0a40241d662c3688e752d
SHA5127230c248da0ba839da245454a37ba169d719de33f9063e3bd4e8381fccb03d49541e94c7d6bd7df48ed30dcfae0dabc054c6483cc1d384f951fa76a94d6baf5b
-
Filesize
96KB
MD5abdf7c2a2de69f2f798043643ef01a8f
SHA11806ca9979a2e1e84584546c506065de5bf01fe9
SHA25637e6fca8e1aa158e984074806f79b20e3b7885a199d54e97da3e463da764bff3
SHA5127eb6ae4126f98054f32358e0bd8efbd11dbe5e712c4284372a92150da30bbec4ee1f102aa7241e1aa4821a29917c9531fc0f50f1703708bfffddb4714f209f5d