Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 12:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe
-
Size
273KB
-
MD5
56fb8a60bd63e00fb4f9c9c0708c8a6f
-
SHA1
60f38acf91d1ba5248dc497df6a502ea21993f06
-
SHA256
140d47d09676bd6c84ad75d3ae07785c9729de0d3603bb7b4a789f7af1da568f
-
SHA512
06d6a398230b18a39ebc4898da8245138c5b6030005a278042b0625d8c7d92b2f2f40f83c65efcf0580641f34f0799bea5d1c14c2b00c5535ed17fbc76988f5c
-
SSDEEP
6144:oyH1hOETjx+j6dMzZ7wsnOw+sXUqdhqZCbBiLhuB:oE15Tj8eeTvAqdhqWM
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2408-9-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2808-14-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2408-11-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2408-111-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1556-114-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2408-235-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2408-294-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2168 DA87.tmp -
Loads dropped DLL 2 IoCs
pid Process 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\01B.exe = "C:\\Program Files (x86)\\LP\\0734\\01B.exe" JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2408-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2408-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2808-12-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2808-14-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2408-11-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2408-111-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1556-113-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1556-114-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2408-235-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2408-294-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\0734\01B.exe JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe File opened for modification C:\Program Files (x86)\LP\0734\01B.exe JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe File opened for modification C:\Program Files (x86)\LP\0734\DA87.tmp JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DA87.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2668 msiexec.exe Token: SeTakeOwnershipPrivilege 2668 msiexec.exe Token: SeSecurityPrivilege 2668 msiexec.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe Token: SeShutdownPrivilege 2404 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe 2404 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2808 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 31 PID 2408 wrote to memory of 2808 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 31 PID 2408 wrote to memory of 2808 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 31 PID 2408 wrote to memory of 2808 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 31 PID 2408 wrote to memory of 1556 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 32 PID 2408 wrote to memory of 1556 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 32 PID 2408 wrote to memory of 1556 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 32 PID 2408 wrote to memory of 1556 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 32 PID 2408 wrote to memory of 2168 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 36 PID 2408 wrote to memory of 2168 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 36 PID 2408 wrote to memory of 2168 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 36 PID 2408 wrote to memory of 2168 2408 JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe startC:\Users\Admin\AppData\Roaming\4D6EF\AFE07.exe%C:\Users\Admin\AppData\Roaming\4D6EF2⤵PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56fb8a60bd63e00fb4f9c9c0708c8a6f.exe startC:\Program Files (x86)\EFD42\lvvm.exe%C:\Program Files (x86)\EFD422⤵PID:1556
-
-
C:\Program Files (x86)\LP\0734\DA87.tmp"C:\Program Files (x86)\LP\0734\DA87.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5c02af78c71e0c2714c0c19947b8ce530
SHA12ee698d4457ed804d4ebe2091f383e3e13af601b
SHA25663173a7f6d2785b176d8e9ba2e313776cad9ea3ccf2713dd8d91b491e7069c4c
SHA5126c11a49541cae6bb5509a74a93c0fae12fc182a46a9bceb9fe9ad864c2f5da223c7b50fb80de377d596b68ebd547b528aaa18f8581ced96f743a3e4b7f84b001
-
Filesize
300B
MD53350a16b0b46d1b7abac704619cc3cad
SHA120a0bfb49246b066b07dc03003e1531ec5de018a
SHA256bb89bedac15a5516ebc3ac4885236d837fbfc53be965088b935f08aca59d16b3
SHA5126488959a27f61e6246db8f5786a7b0fdf73549e85cbfb426cec09a5f0581bcb88ad9c589cf49d5cc4073c5a71a2259fe097a6430ce81352a171171fb7aa77d05
-
Filesize
1KB
MD57b460502575ed3b7a47a9239db8080b7
SHA16ad24ef3e4274c6b24f395edb09a4dbd213a05e7
SHA256ab31341a9d2607d4562497b017973e1b467ff456c6ebfc21d9985aca74e367e8
SHA512e15172b28a83707707de193b0c078991bc5d49f323426c4733b9983191251644de3b7eef939923f83adfa98d675991a0d8ee2145aae1e624849fb271670c1791
-
Filesize
1KB
MD58061e2c106510e4d24b6373a2f80cb46
SHA14b3620d1f3d16fea7e99a78dd013697166fe624e
SHA256e0960fbfd54ad656d17a0ab7d50a83ae97d4876f83067b1f9882e563e39625c5
SHA51263e0594062e21b98f1e5d8700240ab2fef9bdddd7e8154055d1e693ec0de12e5553b0ac45b170b59c5fafb20cf258a5c6afb7025ef3dd7102bf186f21ac660bf
-
Filesize
97KB
MD57ed57812afe5eb758136beab427c5b8e
SHA1da347ebe4068a2d7c33ae732272ff2acad2f5279
SHA2567e9f6353251602f7b674ed3717464181593920f688a3dbd0bfbae8218878d6a5
SHA512568b895d92ae48dc9e43f1a4170a1d18cf73dac553ebe520d58e4cf2dad11c7d14a01aadae9384d64d4a7d34a0359a065a1710a3ed53c2eb803d4752b4e8b7fb