Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 20:51

General

  • Target

    JaffaCakes118_2ef6f6fe6cea3c53ef9901e16e534a3e.exe

  • Size

    275KB

  • MD5

    2ef6f6fe6cea3c53ef9901e16e534a3e

  • SHA1

    7a6085af9d969913996d6406f22d35a1537f2bd4

  • SHA256

    13208dcc20d361fd8d3231108af5f6c0c213b785758b0f217d83a4c21a768c90

  • SHA512

    de405d98d73e32d04b7c2fdf65b80d0e4700df2df6eb8e7e28e1b167b50584ba1563d4a2acf8a13113234426b33ac3f499813d0b3fe08903cca97b11bdf93a6b

  • SSDEEP

    6144:+L/jSlFq50V71+33PHdrNTwxZpFH42ebz3Oudm:+L/jSlMwI9rgTHE7dm

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 8 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ef6f6fe6cea3c53ef9901e16e534a3e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ef6f6fe6cea3c53ef9901e16e534a3e.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ef6f6fe6cea3c53ef9901e16e534a3e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ef6f6fe6cea3c53ef9901e16e534a3e.exe startC:\Users\Admin\AppData\Roaming\0D12B\733A5.exe%C:\Users\Admin\AppData\Roaming\0D12B
      2⤵
      • System Location Discovery: System Language Discovery
      PID:800
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ef6f6fe6cea3c53ef9901e16e534a3e.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ef6f6fe6cea3c53ef9901e16e534a3e.exe startC:\Program Files (x86)\2B636\lvvm.exe%C:\Program Files (x86)\2B636
      2⤵
      • System Location Discovery: System Language Discovery
      PID:828
    • C:\Program Files (x86)\LP\A500\1A06.tmp
      "C:\Program Files (x86)\LP\A500\1A06.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:560
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1996
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\0D12B\B636.D12

    Filesize

    996B

    MD5

    9a4d95066993f65f11debfc8ba58db9f

    SHA1

    d8cc54422acc34c85d7d50e95e6026958c3ca73b

    SHA256

    1c78d728622afa57e086c7cfa1fe7b271495c11bd76f03f9d3de997f88290050

    SHA512

    d231a976bec3b83a5f4c261eb57abee88dc54ad72d152369a18d57034863099128aa01a33cc762d33c29ee3e148625c8661d3ac4a9914eb9b5e91ab53591f4b2

  • C:\Users\Admin\AppData\Roaming\0D12B\B636.D12

    Filesize

    600B

    MD5

    e1d83206246eb03475aad8dd637399ce

    SHA1

    147b90dc971efedadd63714040109f5becbc63f9

    SHA256

    3de2528c0b010957b11ad891ba89482241c5b92aa68d488f88b27f48938dfbfd

    SHA512

    9596e479c9f4df039199c46daad410044384bb5d80a0217a786dd0e1b8a2cf1daa56b24b730409c4d890422aecfcecf44c810f7bc707e24eda7e5e79451b883c

  • C:\Users\Admin\AppData\Roaming\0D12B\B636.D12

    Filesize

    1KB

    MD5

    1f7a8b13175d56183fdd84c8410acbd8

    SHA1

    4f94d4980228629973f573bd13f5cdc846ce1a3e

    SHA256

    f564d141db9befd9f1373cfa64e3975c49987fde775c2d9c01cca1bca4411503

    SHA512

    1b78b65a672f52772790afcbe83428ebe0502fb9fb136d32fa70fad00945baf7dfbde0a85137c26a533289dbbfa66427a6d96cb8e7cbc7a42a4d06c238037aa6

  • \Program Files (x86)\LP\A500\1A06.tmp

    Filesize

    97KB

    MD5

    494a3113d8759a37d39e4cc5a4b3dc2d

    SHA1

    16e693a0055dbc4c799220b522895c22730cdae0

    SHA256

    b3c6ca55cf933b8724e4923a664f5e13cd2dac07f90e9179f41ca2bcda727015

    SHA512

    b9a9a342abd3ae50095d7a405be6058fcdf140fe6893cb3a50caa20df9af4368a9ef5ea47ff1191760395e66381295922d530be7166e575c290057885e0de69b

  • memory/560-322-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/800-18-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/800-16-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/828-133-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/828-134-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2520-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2520-131-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2520-0-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2520-13-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2520-3-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2520-321-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2520-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2520-325-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2520-326-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB