Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 19:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_16d415398c5443ce76a48be2df745722.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_16d415398c5443ce76a48be2df745722.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_16d415398c5443ce76a48be2df745722.exe
-
Size
274KB
-
MD5
16d415398c5443ce76a48be2df745722
-
SHA1
98e4340a22a7b9d6811e33a5d3b48560cfb81e8c
-
SHA256
17c956c2f179d1f91d5c5c95923f4d1c7db13b18ec9bbd3e66d16d4ce3623979
-
SHA512
e35fba808cf332d23c9a7a4b2b85f22db2031d0543512ff7b250b233b2493b25328fdb749be7c40f60f45d71f8a9fa0a54447ff5f7cf13e0d683bc0612e41b10
-
SSDEEP
6144:q7uTmMLFpJa9x7nIUel6f1OjTtkrY2czN+RLQqQtNaz:q7uaMLrmx7nIUel6fsjmr9QWEqwNaz
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2688-3-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2688-4-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2576-13-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2688-14-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2792-128-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2688-129-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2688-252-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2688-303-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_16d415398c5443ce76a48be2df745722.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2064 4154.tmp -
Loads dropped DLL 2 IoCs
pid Process 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FE1.exe = "C:\\Program Files (x86)\\LP\\DB45\\FE1.exe" JaffaCakes118_16d415398c5443ce76a48be2df745722.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2688-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2576-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2576-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2792-128-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-129-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-252-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-303-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\DB45\FE1.exe JaffaCakes118_16d415398c5443ce76a48be2df745722.exe File opened for modification C:\Program Files (x86)\LP\DB45\FE1.exe JaffaCakes118_16d415398c5443ce76a48be2df745722.exe File opened for modification C:\Program Files (x86)\LP\DB45\4154.tmp JaffaCakes118_16d415398c5443ce76a48be2df745722.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_16d415398c5443ce76a48be2df745722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_16d415398c5443ce76a48be2df745722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_16d415398c5443ce76a48be2df745722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4154.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2968 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2424 msiexec.exe Token: SeTakeOwnershipPrivilege 2424 msiexec.exe Token: SeSecurityPrivilege 2424 msiexec.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe Token: SeShutdownPrivilege 2968 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe 2968 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2576 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 32 PID 2688 wrote to memory of 2576 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 32 PID 2688 wrote to memory of 2576 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 32 PID 2688 wrote to memory of 2576 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 32 PID 2688 wrote to memory of 2792 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 35 PID 2688 wrote to memory of 2792 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 35 PID 2688 wrote to memory of 2792 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 35 PID 2688 wrote to memory of 2792 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 35 PID 2688 wrote to memory of 2064 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 36 PID 2688 wrote to memory of 2064 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 36 PID 2688 wrote to memory of 2064 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 36 PID 2688 wrote to memory of 2064 2688 JaffaCakes118_16d415398c5443ce76a48be2df745722.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_16d415398c5443ce76a48be2df745722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_16d415398c5443ce76a48be2df745722.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d415398c5443ce76a48be2df745722.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d415398c5443ce76a48be2df745722.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d415398c5443ce76a48be2df745722.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d415398c5443ce76a48be2df745722.exe startC:\Users\Admin\AppData\Roaming\57D17\D0DDB.exe%C:\Users\Admin\AppData\Roaming\57D172⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d415398c5443ce76a48be2df745722.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16d415398c5443ce76a48be2df745722.exe startC:\Program Files (x86)\17C57\lvvm.exe%C:\Program Files (x86)\17C572⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Program Files (x86)\LP\DB45\4154.tmp"C:\Program Files (x86)\LP\DB45\4154.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD57d3e06d98a37ad86a0e83fb041d65a5b
SHA1a9b2cffc09530f090b556267a64725bcc184664a
SHA256980eca0c759d4fb24a9c82852d6eb9055b515716c2b77923a4ec49e20edb9706
SHA5123c14c4c33698e5f78be2c8593cd0304d13c843e6669e183b13eaa68593ffc29b5f613f11c8dd05823c6a0f9213b888444890a0866eec13f03ea7d3bae8180eda
-
Filesize
993B
MD5206d51afbacf4da93738540050a4f4b0
SHA121f1194974e8e2788ef31bb1dff97121e4edf40b
SHA2568269bd7ffa2df2370a4e74a16ff95e2f17468ddf442d6238c6f31f7cb67f8187
SHA51248335d718208ae0b0cfc238c2d8e0563e3af02f14e5ae75e3e1c4bc565439a67ecd06463730ab6e7d2dcd0dd1d8565709d45289154e80e9248e4a48bf51e7681
-
Filesize
300B
MD520186eb49b09b41a7275f21834184acf
SHA189fb28f6f8ed3ff5830229f153dc29b9e930e674
SHA2569a562807c08ca6ee133e29cd14cb67d5f92d49287d60dd51b6c7ec8b673ea88d
SHA51283d7d6ef4c03ac74e05bd2df7ec5b815de747cdb87c7ddadff33e8ce363ee08f2d06844d327f8bcd8e6c0668ace474a1346462a696b3c03cfa29aa80db67b188
-
Filesize
1KB
MD53d8965caabbe4335f7d8d52d06dce1ea
SHA1eeecfdd2d8865708f53af294ee131269d0bf305c
SHA2569bbebd2402d98d6c4631318169c342035d8fad7f91f1483faa378c97294d3a06
SHA512a8eb8e756dd46868503724d961ec5db3aba510f80bd9a6fd0bd927b4f73ec53def9bae1d6390d332154b5b698ffd3b692011b3d4a291cd635317c4d3c4d7de0f
-
Filesize
98KB
MD5137b967546ac441246b86423c0371e6c
SHA1288e6b0171b769f6cf89f2a94b7d278d99866186
SHA256b99b941a23c733c3516fcbe0c0f254a1b8add5982612e251ddf73e243511fc46
SHA5124317a5f44b4404d1880f4248529e496dddc5025de60af57d0c7f4fee510715c93db5aba1f3c7851ef3efc5a53be9c6445b9a93e8ea65c4ebe5a2ab44ccb98810