Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 23:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe
-
Size
276KB
-
MD5
00c58b602603b7469c27d35bdfba2a56
-
SHA1
2ad6873ce069613bf75d182baa5b4af1b5b94755
-
SHA256
fccda9ebd2b3b446b713a5754b7d5a70e47f361c0ac457d7529fadd83dfac910
-
SHA512
848b1ae747e6887cce8b7ec92a3aa58fb8bceb8debac2192897cc901b952dd85d03869b298574979601103d8a9ac7ab1c0910a8b5f6eba1ba229a29b0342be2b
-
SSDEEP
6144:qmYKhFqpD1EcbFFBJBU+iWrq/67IXn9Dhs2pzTJRP7Bi4Gpd:qRQUDfFFm+i2q/67Y9DuYzTJRP7U/
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2368-58-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2368-60-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2500-63-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2368-180-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2012-184-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2368-347-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2368-351-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2796 4E5E.tmp -
Loads dropped DLL 2 IoCs
pid Process 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\19E.exe = "C:\\Program Files (x86)\\LP\\5429\\19E.exe" JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2368-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2368-58-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2368-60-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2500-61-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2500-63-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2368-180-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2012-182-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2012-183-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2012-184-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2368-347-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2368-351-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\5429\19E.exe JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe File opened for modification C:\Program Files (x86)\LP\5429\19E.exe JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe File opened for modification C:\Program Files (x86)\LP\5429\4E5E.tmp JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4E5E.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2444 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2520 msiexec.exe Token: SeTakeOwnershipPrivilege 2520 msiexec.exe Token: SeSecurityPrivilege 2520 msiexec.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe Token: SeShutdownPrivilege 2444 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe 2444 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2500 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 32 PID 2368 wrote to memory of 2500 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 32 PID 2368 wrote to memory of 2500 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 32 PID 2368 wrote to memory of 2500 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 32 PID 2368 wrote to memory of 2012 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 34 PID 2368 wrote to memory of 2012 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 34 PID 2368 wrote to memory of 2012 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 34 PID 2368 wrote to memory of 2012 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 34 PID 2368 wrote to memory of 2796 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 37 PID 2368 wrote to memory of 2796 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 37 PID 2368 wrote to memory of 2796 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 37 PID 2368 wrote to memory of 2796 2368 JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe startC:\Users\Admin\AppData\Roaming\91460\92554.exe%C:\Users\Admin\AppData\Roaming\914602⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c58b602603b7469c27d35bdfba2a56.exe startC:\Program Files (x86)\603BA\lvvm.exe%C:\Program Files (x86)\603BA2⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Program Files (x86)\LP\5429\4E5E.tmp"C:\Program Files (x86)\LP\5429\4E5E.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c753215b2b486601b45746d3537f18ed
SHA1c48390669464a984d47089a7a16e522c61cf502e
SHA256e0455d3d7970c69c3702cc73e3701d9aad37b94dedc315f0ebaefb4ef0829f21
SHA512a3871555818de845c2ebd018f320e2be6dd0f3254c56c606e463e545d3cc6778acbeab5970ee430d4324c2cb93aefd41e74b492a3200a25193e9440b5c9197a2
-
Filesize
1KB
MD56ed2d33c162f1eaad3ca32291d16720b
SHA101f0f6b86f1049b989661db9a45391bdfe47da9a
SHA2568e5a5ba3b49fb969ed7cea505b10dcb2aaf1f221ae925d1fe6d9505ac7d23d9a
SHA51277dbfd5ec46f204d34797980f897bbce885b54937db57ccf70dfca1bb9e71b927c57a814b4e5f1be94db71c7f3be76fde379399b513bd3b8934959b2de6ad262
-
Filesize
600B
MD588753f87c755efd6aeea21678f51f63d
SHA14cfadbcca0f3b9cdc25584362540720d2d8aba21
SHA256010f8fdb483b621b321db5060d5d4757203d0641bf99ea2a09531acb272e9f31
SHA5122434fad99effa0c745ebd7c1f3ba43cee348d549da3050be9abcc8bfeab4e245d399b320f16da3d18aced5c3486bec6a2516877e33c8c1e2147ca97efb365427
-
Filesize
300B
MD53a9257b7e6edac18324c29f859079f47
SHA146c7e37d363435341ac7e562abe35dd021850e94
SHA256c73fd6fd2010400db79c41ece5acabef1fa6aa8db7d428f903883b8ca0bc6b07
SHA512b961ab767efa47960fcdcd3b6f0fa5e8d0fcaf4b8cb53ce3c9a07dae587f10a7c2cfe989bb57fd5f1431b9f5fd5888d77c142a78bbc8908806277b331ef42ffb
-
Filesize
97KB
MD59c85bd17493589b355bde43c7816e9df
SHA1aadfffdf9f58ad9340af181513d9d9ae08f886c3
SHA256c4985933ec39f9787a37466153497fb56d3dd43d49909c436362ef488d0587f8
SHA51243a764d9c6681167f7bb393d526255390c3655bf2488e3b0ee0316e88f1d7dbecafaf22a34eb791a48ebbd2b0f1bd4d3cee06e7e82c2ab55d18c77af6e25ce59