Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe
-
Size
273KB
-
MD5
e13f1b7f45d99e88c2be459c7caffd91
-
SHA1
c7341562529930ab22843a773a39c2fde0eeba30
-
SHA256
b67c52a3d00ddde108f4366b640afd4481ec46fc677696521040311d383448e0
-
SHA512
b38da9d9a6d1efdf7a2ddace409d53010424bd5ea55371cf7bd50a52bde61fac7fc06dd0b3076c98e6e8d841c0345a2d1a83abfff926a2da98f303bfa56c0aff
-
SSDEEP
6144:P5ZRjqjwX9bDjclGvXL5G6e/KbhofVehvcq00e:vRO8X9PFvXNx6KuV0v1
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2264-14-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3044-15-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/3044-16-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/380-79-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3044-80-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3044-158-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3044-199-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1804 2DE4.tmp -
Loads dropped DLL 2 IoCs
pid Process 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5AA.exe = "C:\\Program Files (x86)\\LP\\D3AC\\5AA.exe" e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/3044-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2264-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2264-14-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3044-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/3044-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/380-77-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/380-79-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3044-80-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3044-158-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3044-199-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\D3AC\5AA.exe e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D3AC\2DE4.tmp e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D3AC\5AA.exe e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2DE4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2620 msiexec.exe Token: SeTakeOwnershipPrivilege 2620 msiexec.exe Token: SeSecurityPrivilege 2620 msiexec.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe Token: SeShutdownPrivilege 2192 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe 2192 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2264 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 31 PID 3044 wrote to memory of 2264 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 31 PID 3044 wrote to memory of 2264 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 31 PID 3044 wrote to memory of 2264 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 31 PID 3044 wrote to memory of 380 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 34 PID 3044 wrote to memory of 380 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 34 PID 3044 wrote to memory of 380 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 34 PID 3044 wrote to memory of 380 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 34 PID 3044 wrote to memory of 1804 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 36 PID 3044 wrote to memory of 1804 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 36 PID 3044 wrote to memory of 1804 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 36 PID 3044 wrote to memory of 1804 3044 e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\C5C61\80ED3.exe%C:\Users\Admin\AppData\Roaming\C5C612⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e13f1b7f45d99e88c2be459c7caffd91_JaffaCakes118.exe startC:\Program Files (x86)\61987\lvvm.exe%C:\Program Files (x86)\619872⤵
- System Location Discovery: System Language Discovery
PID:380
-
-
C:\Program Files (x86)\LP\D3AC\2DE4.tmp"C:\Program Files (x86)\LP\D3AC\2DE4.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD524af0b51f49cd8eb536cc8e87fd73c60
SHA1792bce003d7790a2fb3f4c887927790e009e794c
SHA25668ee90cd520237bb5926da2ec431b2093a4b286878e17071d461ce5b6ad6254e
SHA51243b2f7b7c513986120cbe70c470321b6c18d12a6d0ef5f2faa608996afdfd4cae754b31383ae9a18b9a7cf530506fb0c0139039a5a4c16a6614868b186d2d44f
-
Filesize
600B
MD5415ef6c34b11fd75ddeb27a2f3ff0bf0
SHA1c182ae35da594fd278c7f08411e019680ddcc43f
SHA256f39a6f16cee89b2b446193b7ae4b273b2e8d0653e3baa5c5d6873da27e986305
SHA5125a36d7f8d62a8b2ff395b2c8911584f8c49301799befa3a6e609fb2ca97055e112a9a379a2c05b735bf121748b305c08c4e5128befce9a956f86281230493a41
-
Filesize
996B
MD56519adbcb6e1f8069cbd818d36bcae9e
SHA1a9dd744111701a314b7093a985778c8cca454173
SHA25694845ed51e11d697e857a77a5e3f8a788809027672f96ef50843d37ca9a9adee
SHA5126777bb779d5902dba57790202a3c33789bee357cf3dea366d45903f620c1859283fa712e173d3071cd474f08af79b3e1548520e1f84cb3a035e5b6df2cea345c
-
Filesize
103KB
MD586d203aa2caa9884b7b360153e9ea8c1
SHA1a10e4e44dfc2a2ace55bf60eb769da2dcc79ca73
SHA2560e8be7424ef08580c27c82cdc0226abeef27ce7664a16491c4d5c7eecbe6272d
SHA512491afdef0e57cd084ac76493755c3dff971f1aef06bd4bc3d13447e159f3a32e8b9cc39e30af4f934badaeb2d922a18cf40dfc933b32b9afcb9b64d3a9349567