Analysis
-
max time kernel
140s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe
-
Size
283KB
-
MD5
cc0053aba0a250c503a2ef112ff70032
-
SHA1
5faa06ae174e4a64e15a5e48c73224c79ea5302b
-
SHA256
eb2d3f3a35e2b8eeed9c0dec4d748f06410281463587c03f6b9d0b8b2ede2f9a
-
SHA512
1de1419c0ffdc420614bc5668b2b15ab56b2297dfb73bb337604455c5644c1d684eba0736a290bd87f16d278409050a2f2c8de18d9571f7ee985796080f95e10
-
SSDEEP
6144:YFB4TgU5nE22PeSNJCBbYmBxFgx7W6zbls/MOrMznAAuBexFv2F:YF4zldOeSNsU4/gxtB87AsAuInv
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1948-11-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1948-14-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2932-16-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2932-17-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1948-153-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/336-155-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1948-338-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1948-342-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1844 F42E.tmp -
Loads dropped DLL 2 IoCs
pid Process 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A07.exe = "C:\\Program Files (x86)\\LP\\FD0E\\A07.exe" cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1948-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1948-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1948-14-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2932-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2932-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1948-153-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/336-155-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1948-338-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1948-342-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\FD0E\F42E.tmp cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe File created C:\Program Files (x86)\LP\FD0E\A07.exe cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\FD0E\A07.exe cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F42E.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1884 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2596 msiexec.exe Token: SeTakeOwnershipPrivilege 2596 msiexec.exe Token: SeSecurityPrivilege 2596 msiexec.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe Token: SeShutdownPrivilege 1884 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe 1884 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2932 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 30 PID 1948 wrote to memory of 2932 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 30 PID 1948 wrote to memory of 2932 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 30 PID 1948 wrote to memory of 2932 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 30 PID 1948 wrote to memory of 336 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 32 PID 1948 wrote to memory of 336 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 32 PID 1948 wrote to memory of 336 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 32 PID 1948 wrote to memory of 336 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 32 PID 1948 wrote to memory of 1844 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 35 PID 1948 wrote to memory of 1844 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 35 PID 1948 wrote to memory of 1844 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 35 PID 1948 wrote to memory of 1844 1948 cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\EDCC1\572FD.exe%C:\Users\Admin\AppData\Roaming\EDCC12⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cc0053aba0a250c503a2ef112ff70032_JaffaCakes118.exe startC:\Program Files (x86)\C1A9A\lvvm.exe%C:\Program Files (x86)\C1A9A2⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Program Files (x86)\LP\FD0E\F42E.tmp"C:\Program Files (x86)\LP\FD0E\F42E.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD512bc42d65860950d9499bbec247b3654
SHA167581aa847688e07ccbd356a383e20d8aff86b92
SHA256b08e8831be6697495ccfa9f6dd3b5dc5ab7f310f7226e6dd0d3e07647f1bd816
SHA512c900cb0118c3fed2b0136fbfb23a43bf83f56e4b8dddbd36c5ebfa8adce9b2b71b253d576f14faca18eb40f64799aa2786358b2d7ee0dc766f27b2bda99219ee
-
Filesize
600B
MD53ef2a7f7b678e6fa628525cd2096ca62
SHA1f4d1306378179c390fdac1569db69f5cb5edf19e
SHA256c5633b0841f305f42a41a35633333f9df27e37755e7a1850ec1d6587a4e10260
SHA5126f5a2ccc756c0274b5ae67799b62c9b901c88c7a2ad452d10ac169869969546340c013d07169314a9aa8003ccee9cd6367a30158f8c2efbf9de3a8a522289b3f
-
Filesize
1KB
MD5ceac64522f7eea584dc298d572521e91
SHA15b7448224d9b66190b685055d6895e0b9435f084
SHA256c34915049ba1acd3a953702f3a1245a0e2786735bcae4b9ae4faaae24c39f620
SHA51215bdede8304bc92ff7e647c8e69bc6c307c6804d282069bc4aeba9634899b713e23c2252e7d5a1400b40954aff14d6a120bffcf70e7a3b80dc79422b61bbf3fd
-
Filesize
300B
MD5f8bdb8d379f8341ae2e6f11691c3503d
SHA1b585bcac05f19cf35163dad2eac811311e412d96
SHA256fbd914fddff051584f51c5138639f428cd69c7fe30a7ab01bfdb75e8b59bb024
SHA512d03a8e0f664051614a3059ef3ea0009972c1477da4c04184693fbf12226612b045e5c49ad24e47aef0c6f4dee7f53b5845521864f26c5d31c8c627f7d2e7e801
-
Filesize
100KB
MD58659e2fdb286421874e997e5b1d56ae4
SHA1e3b46183011a317dd80baf92ff9ef1b2da53cc05
SHA25680ceedded02c13a9c4ade2d2242b2bb295bc122b5c7c0f6b3332b0f4fceae2b8
SHA512ae12fd737c0a6f765ebe7a6e312230220e5fb79d42c1478a6f00edf5e67b6dec201aee90d3082b7817726c6501c7c94ce4a8eab72b2a00547bfdc382bbf2a8dc