Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 16:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe
-
Size
275KB
-
MD5
5cd508cb8ee5797f23c46f9da1aa8413
-
SHA1
7ec0610727ea741e9d2220a569475902add3081c
-
SHA256
1a4bcc2f1c656805ee2fd5dc76e9d5a553e2f6fe1668ba4f9b0a381dd221d162
-
SHA512
4b027270bcc92c6ba79e489b38432dd05b8f64ed55f065db961424f670fc9205d1e421397478947667fcd7725cd05bea026249582a2555b2fc91604b25811dbd
-
SSDEEP
6144:+2ShGGlm5OknD69IpLyZfKr7/xDPnzENB/Duo8q00j5D3:uZm5OWIg0fwZbENB7N8q0093
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1544-66-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2716-68-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1544-185-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/900-187-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1544-366-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1544-371-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1900 818F.tmp -
Loads dropped DLL 2 IoCs
pid Process 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\9F7.exe = "C:\\Program Files (x86)\\LP\\24FE\\9F7.exe" JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1544-66-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2716-68-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1544-185-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/900-187-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1544-366-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1544-371-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\24FE\9F7.exe JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe File opened for modification C:\Program Files (x86)\LP\24FE\9F7.exe JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe File opened for modification C:\Program Files (x86)\LP\24FE\818F.tmp JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 818F.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1688 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeSecurityPrivilege 2568 msiexec.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2716 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 30 PID 1544 wrote to memory of 2716 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 30 PID 1544 wrote to memory of 2716 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 30 PID 1544 wrote to memory of 2716 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 30 PID 1544 wrote to memory of 900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 32 PID 1544 wrote to memory of 900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 32 PID 1544 wrote to memory of 900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 32 PID 1544 wrote to memory of 900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 32 PID 1544 wrote to memory of 1900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 35 PID 1544 wrote to memory of 1900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 35 PID 1544 wrote to memory of 1900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 35 PID 1544 wrote to memory of 1900 1544 JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe startC:\Users\Admin\AppData\Roaming\ECCB0\93024.exe%C:\Users\Admin\AppData\Roaming\ECCB02⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cd508cb8ee5797f23c46f9da1aa8413.exe startC:\Program Files (x86)\B0B2D\lvvm.exe%C:\Program Files (x86)\B0B2D2⤵
- System Location Discovery: System Language Discovery
PID:900
-
-
C:\Program Files (x86)\LP\24FE\818F.tmp"C:\Program Files (x86)\LP\24FE\818F.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55ed54efb782d612be3a3a57d2296924c
SHA1f7ef96292a004257202f4d81db220a98ddfcc9b7
SHA2568006f92d305a484e63e9ef3d9b5a10ecb78afd3a476cab38a263e3874d8027e3
SHA512539b8e5a1bdbd61391d9da86d295ede84d3061a314510f9083275a048a792e7a742c7e9905bf7f7165b2bc8f0265b21ccfce421ada70fe99d3439fb614229a8b
-
Filesize
1KB
MD5ae4b78504ab1cb8e90594adba31baa57
SHA16a57be07d8a07dc2a3395d225b323a63e7d53b76
SHA25603856fa70035144d7c55a9cdea1ecb69e35dbc84dbf05d5242f7cbd9256a7ead
SHA512157259e24f6b98c77f57b6f68dff59697168bfd1d55413a94ef566c178215030cebc37129b6f8912e2ffbf1bd01371c148c996c7bb1ec5409bfc3920722409b6
-
Filesize
597B
MD54d072dafb2ee0b6fcad6ce15813bb3c1
SHA16ecd3be368627a2c37271bb0ccb001cb362e2099
SHA25649faebcc46f0860fccf2dad8afb9067ad7e7da45d2267a2d7117a306bce7aa7b
SHA512f9d2b1ed8473e82cb3abdee70be151752d78ae414b42e32293a4187e4620616781d557f5a4c3ae631d80488b9a8f4b0553b6f2131107ab44b4e45a63c406f737
-
Filesize
297B
MD5f35de969e48aeafe599485c0bb8a77f8
SHA1a13e667d2f138998fd8d84cd3b38584dfbe0f679
SHA2560e022b233d7359815c17c203beb3395c10e7332f5d47ccc50b239a8df8da7390
SHA512429d040fa55156fd62072d7d3c33b2126f2532e37e31502033206488a78a73ed6994f847791b8896f9d1d3a48d717d0ab3ec469c081bacac588e7c3dea93b044
-
Filesize
897B
MD5bf44ba30e791cca23aee82ecefa858eb
SHA1b34264cb5d3aa309dcfaa06d19b3870c7f0922a9
SHA2562b677a23086afddbf7a5b9de2686676a5fce1066fc998a854326291a04d7903c
SHA512b046524cc53da7fbbe6ba822d939af0209279de2ec2912815b495a42152916fa4fc5406b58e87c2f671ed25e38bfa5faf0dd6a715c603416c78eded7e9cd96f7
-
Filesize
98KB
MD5d2f9249a8e945366b1aec5fef40331b8
SHA1b13003515ae20ad9993059be4139263a7e142da3
SHA256e68e54936550dc4a38abb97e0d32df8a57d2667b6f92461a380655e6218499b0
SHA512640190968d6ee05af66fc4b003835aadfb98655e1a5c7803db8b6bce7290bdc643f313027c6ff1b11a1bd750a043eff492602c65501c148bd6e5607d4ca3047a