Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 14:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe
-
Size
277KB
-
MD5
2a4adabf4dc4332b62ccebb92d2c05f5
-
SHA1
bb7ac273fd5b87ce0fd4164a5fcb950ada9c5108
-
SHA256
4b6c7aee83d8bfece50dbd35751fc39a56b19fb89105b969b80f82b0cf1faa9b
-
SHA512
d8910957d9bfca27e2f4ab5c4031c975c69ba611099cd655a0b6196d0ade512ae53dae8c433f85fc8cd525f570ed75f20af648e9476f9a2835ea3cff8e69df2b
-
SSDEEP
6144:Ov1mQOf70/6XslCUk/OaLL/zS2RAzBMdJK9BnJa93e95u:i1mQU0SXICh/zLRAXBN9
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2784-46-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2024-47-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2024-48-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1860-113-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2024-114-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2024-224-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2024-226-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 880 515B.tmp -
Loads dropped DLL 2 IoCs
pid Process 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\83C.exe = "C:\\Program Files (x86)\\LP\\D3AE\\83C.exe" JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2024-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2784-45-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2784-46-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2024-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2024-48-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1860-111-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1860-113-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2024-114-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2024-224-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2024-226-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\D3AE\83C.exe JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe File created C:\Program Files (x86)\LP\D3AE\83C.exe JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe File opened for modification C:\Program Files (x86)\LP\D3AE\515B.tmp JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 515B.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 900 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2108 msiexec.exe Token: SeTakeOwnershipPrivilege 2108 msiexec.exe Token: SeSecurityPrivilege 2108 msiexec.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe Token: SeShutdownPrivilege 900 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe 900 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2784 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 32 PID 2024 wrote to memory of 2784 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 32 PID 2024 wrote to memory of 2784 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 32 PID 2024 wrote to memory of 2784 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 32 PID 2024 wrote to memory of 1860 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 34 PID 2024 wrote to memory of 1860 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 34 PID 2024 wrote to memory of 1860 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 34 PID 2024 wrote to memory of 1860 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 34 PID 2024 wrote to memory of 880 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 36 PID 2024 wrote to memory of 880 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 36 PID 2024 wrote to memory of 880 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 36 PID 2024 wrote to memory of 880 2024 JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe startC:\Users\Admin\AppData\Roaming\E450D\A1ED3.exe%C:\Users\Admin\AppData\Roaming\E450D2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a4adabf4dc4332b62ccebb92d2c05f5.exe startC:\Program Files (x86)\0D4DC\lvvm.exe%C:\Program Files (x86)\0D4DC2⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Program Files (x86)\LP\D3AE\515B.tmp"C:\Program Files (x86)\LP\D3AE\515B.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:880
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c5eb0c1d004034fd38f72ed2e4796df8
SHA10107685b0772ed6e7adb239a8bcb0822a476889e
SHA25627df1bb73a90bf8903b318c3c4806e1acadebda83cfb512b1edff1544d7f1f80
SHA512d1834bd9312489ba55a9bc087aa8b18df7a0023b2cde655da7b0fd1e328f61c739f70788867d3b59778750d2d5d46dcd2f6a27b9e6aec04d7a90597413a7b082
-
Filesize
1KB
MD5b2f5ffc02236711901ba95979a957c22
SHA1e3419fe65449502d0a3bb1314f82d96337db4096
SHA25664a8af0a2fdb1b43db8b11f9579378381f5d3af0656ed89118df32423bd34136
SHA512dcbee2811914cb167aa05e964bd3c59e8b5bd73a64fdd8102a0b7a7a941c872e9e1761f062757bcd4043240dfcece83a02e5a13dc40db689c969582dff43c70c
-
Filesize
2KB
MD52ced9d6b6117962c5d5b41ce8bc51168
SHA160da628e968cb89d69b0b76fe07bbba135345191
SHA256815adc15889929805688c6b0b3db2fd561df32ccfd417f294fefa8fa28bce87a
SHA512cc281fdf594d70da64e5189a67da73d94fe56190696d688c4c5b66d355933a94f22b4728d26fec815787c9c224de6179940a756019b6ba20b5d75c3d375d747b
-
Filesize
597B
MD5736bd66bb663242f12001dd5a4730acd
SHA1aece68b1e3a42cef6a9713e40469a5b649529f6d
SHA25605ccb3ab2f96e9a1e073f0a4966c529a387e127084a44941461b33f40410abc8
SHA512e48fe389626849e84e447b2ae65db27e5aa589fc68fbe0969581cf4c9c0f589446bc234693d5cbb02b5f476c54de5d8a1abb424c6ea62e64d7633984d9213294
-
Filesize
897B
MD590169f3e3e20c1d96136439408555b3d
SHA1fd0b050b0ba85fa4e76138304dd1ed920949c388
SHA256790e840d9db8a420a421f484fadf470597f18a9f26cbeb595fe190f452284ab4
SHA5124034f10dc4cc8e2732db1937877bf5e436c2a928b19574cca310e126212fba44a085c38459a918f4d7bbf17c0e23dfdaa336c2edeb8bab20eabe8b1cf6dff37b
-
Filesize
297B
MD5b2ae80505b435a5bba86306d3b1e8564
SHA1353c5b4a0ddc6f48520a05c6701f0ec5151a2cea
SHA256a34225188f739e2f1db325cd28ca33d8d01b9d9eb5e1b8964d91f3d702f73514
SHA512c03f4cd8716173e540e990462ac601de4154155d4c1e28550b9da90051d8906a669979437c3a6074670e80653b1b8744c49208a70d2d251a84c44ca6858c364b
-
Filesize
104KB
MD5296365f98338c7267752451423e72be1
SHA1951728a38cf1824967b036cfa2ea701912541e61
SHA25612ea8a3c0368375a8690de8439051576677a4b818f5599b57eb00264882a8bb0
SHA51283e37ecaee17f464f89b0c1437660b7856fc4bd35f28e355d6edd7b3424d2f8f95f6f3b9f7871f631051ed013cf35c544748b2d6c083c07ac095945cad4fe15c