Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe
-
Size
279KB
-
MD5
e3898eb5c1d293b88c5fdeb2c1a8acd4
-
SHA1
26e9bf2f32aa2d2fbea0af21e541ead9c01fe554
-
SHA256
7b665940ba5e1f68b6e2920358ee1efb6d4fc3986489f2487dcf0bf07eedcb8a
-
SHA512
b26577b8cb4fa4e1920ec8c60c3e5286d4a538203fdcdb51d7326f08437cb47cc271513285108064de2cf4e2b6ced8e149d7ee8026f7a0e65232abb630629f46
-
SSDEEP
6144:wtdrZkJQtORT+J25p3HhMeNhSizEpscyl7BeDKL+cbMeQFFHF:IdlkJQ8np3RbzujgBWKy8QFF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/3000-13-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/3000-15-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2696-19-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2696-18-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/3000-116-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1616-118-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/3000-289-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/3000-293-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 572 2452.tmp -
Loads dropped DLL 2 IoCs
pid Process 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C98.exe = "C:\\Program Files (x86)\\LP\\26FF\\C98.exe" e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/3000-3-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3000-13-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2696-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3000-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2696-19-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2696-18-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3000-116-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1616-118-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3000-289-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3000-293-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\26FF\C98.exe e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\26FF\C98.exe e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\26FF\2452.tmp e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2452.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 1724 msiexec.exe Token: SeTakeOwnershipPrivilege 1724 msiexec.exe Token: SeSecurityPrivilege 1724 msiexec.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe Token: SeShutdownPrivilege 2580 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2696 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2696 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2696 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2696 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 31 PID 3000 wrote to memory of 1616 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 34 PID 3000 wrote to memory of 1616 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 34 PID 3000 wrote to memory of 1616 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 34 PID 3000 wrote to memory of 1616 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 34 PID 3000 wrote to memory of 572 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 37 PID 3000 wrote to memory of 572 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 37 PID 3000 wrote to memory of 572 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 37 PID 3000 wrote to memory of 572 3000 e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\FBE68\DC526.exe%C:\Users\Admin\AppData\Roaming\FBE682⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e3898eb5c1d293b88c5fdeb2c1a8acd4_JaffaCakes118.exe startC:\Program Files (x86)\68019\lvvm.exe%C:\Program Files (x86)\680192⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Program Files (x86)\LP\26FF\2452.tmp"C:\Program Files (x86)\LP\26FF\2452.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5fc11ec4c7837f106355d83abf4195405
SHA1caa6c4132278110f697bf4f5070fcee74a9c0fcd
SHA2567719a6e77d7d64637b96cbe0d9fabe2c2efc101b85302dcb68d785fe4b26df57
SHA5129078f3fd12f14ec1088152ce80cb67773e990f5fea84d61b9eb4f9cdc485433aea3b5dbb4b050adfe3505a887d6f3faeec05fc37542612dc1a4dfa38dfcefdc0
-
Filesize
600B
MD529ceb300f427e0a93e94cbb5f2855c16
SHA17792dcf95663f8d488f7c0d3a20729b99f2ba1a0
SHA2569537d60268625858bbf3f89ec612b4a61c13b00f85faa90294ccb28fe4be3cde
SHA512aa79be51651d32c5ef210ea5c5968393b24157b9b84309aceb3caee0652655cb41e2208a78eece5e26fdd2ac1c151635cb5e877c4669e54f5e9c09451cd5eae0
-
Filesize
96KB
MD5a083efe2de60f01c2f7643407751dff0
SHA10b75d39732c767f2d2818ba19f9a36a3581b6dcb
SHA256b39a75a56558dec099d048b8f911a11e05a2cb380ee4ec7e0fae41d990e002aa
SHA512d9d378feae1c6834acc4382f292544c669733e7fd3c939b7bc76f1e32b483b5adfdda424869de3623c2e5a2693898012ba4356650717595d8b58c7b84eb11cf8