Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 02:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe
-
Size
286KB
-
MD5
0162f1f007a29a3253fc96b5f5c6d990
-
SHA1
e52f3a6422b94e47eb1e92409033419ca0ee946f
-
SHA256
9d64fa2404c918c004503d810c0f4f3cbe65cb88fb1371a792e1ed26cc9606ac
-
SHA512
6a3d97a53d1a72d2f56ddb71019cdede241b65bb5b495bf013ee1dd0b22b6f2b10a112f97ae13a4e77494ebd545bf1fa786f4a6749ef34d621092be37a36345e
-
SSDEEP
6144:xMWg18eL35t0XdDXy8DDnWjEtvFIuZeSHMwVQ80uH5No:k18evaDy8nWjyfeK9Dw
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 9 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2848-7-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2028-13-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2028-12-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2848-9-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2848-117-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/672-122-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2848-263-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2848-305-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2848-306-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2072 6307.tmp -
Loads dropped DLL 2 IoCs
pid Process 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5C6.exe = "C:\\Program Files (x86)\\LP\\32F9\\5C6.exe" JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2848-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2848-7-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2028-10-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2028-13-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2028-12-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2848-9-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2848-117-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/672-121-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/672-122-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2848-263-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2848-305-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2848-306-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\32F9\5C6.exe JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe File opened for modification C:\Program Files (x86)\LP\32F9\5C6.exe JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe File opened for modification C:\Program Files (x86)\LP\32F9\6307.tmp JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6307.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2956 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2780 msiexec.exe Token: SeTakeOwnershipPrivilege 2780 msiexec.exe Token: SeSecurityPrivilege 2780 msiexec.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2028 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 32 PID 2848 wrote to memory of 2028 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 32 PID 2848 wrote to memory of 2028 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 32 PID 2848 wrote to memory of 2028 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 32 PID 2848 wrote to memory of 672 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 33 PID 2848 wrote to memory of 672 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 33 PID 2848 wrote to memory of 672 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 33 PID 2848 wrote to memory of 672 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 33 PID 2848 wrote to memory of 2072 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 36 PID 2848 wrote to memory of 2072 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 36 PID 2848 wrote to memory of 2072 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 36 PID 2848 wrote to memory of 2072 2848 JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe startC:\Users\Admin\AppData\Roaming\95E34\AC432.exe%C:\Users\Admin\AppData\Roaming\95E342⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0162f1f007a29a3253fc96b5f5c6d990.exe startC:\Program Files (x86)\34AD8\lvvm.exe%C:\Program Files (x86)\34AD82⤵PID:672
-
-
C:\Program Files (x86)\LP\32F9\6307.tmp"C:\Program Files (x86)\LP\32F9\6307.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5b81bd9c8be6bb7db330217c11a3a168f
SHA14e3cc20b2cdff59339eff4bbca4cc71ed71df255
SHA256ab6b62c0e39240e59fe2ff6b0da2a5a8ebbdd57f43607b2e34636f36e986c714
SHA5123850184e29273f7264ca6a3ef9471a2be8779b29a13e1320b0d7f68ffb2e41f56c4eecbde5cb34e02ebba4846f90da59b788e9c9fe7c56f3deb91fc3a99325a2
-
Filesize
300B
MD57cd4f8559e2f94b963c94c09747c2ff4
SHA1a55a151961510a5d224a25921c466281f903eb7c
SHA256557868d5706e5508f66d7c38591b788ed0a00bd71bf725a8251342732b63d723
SHA5121b406c045c962f5522e7e8304ecd4a20cab26ea691a31448245dfe2c543f727782ce52242ec4335450b086a4312414dbe0dc14c921559d7af9d7b4038aae9906
-
Filesize
1KB
MD53e35ac1e87c2dae4f3ae09a583f88e53
SHA1b5b142e67522aba82fd625fa5be4bd0db172c503
SHA25605928300c7cce1f048e412a7246f9b0b36ce4ea8749784e35c60073a0be3a2a8
SHA5127be7f26744a9325e59c55bbce74738c6d0a9e5092dc45a270546cd131f18accd42a20343e58203c8f96424d94d46c5590ccbd75ef929e524927eb99d41e426c9
-
Filesize
1KB
MD57bc23eabbfc0fa56ae97c09673d6b961
SHA14b6553052712dc018c7ed7854ffd8275dbe480f3
SHA256b2cebc8e78cee82f3ecd3808b10b149ad3d14a7980b72eec6d4d03f3252a5be5
SHA5122cea62aad22bec15f2bc506aeade92923e4f4abb0e59673a2bce523f5a59a4d1661bbd7eae0f9fdd03386c974bb48a4645375d56b4f432cb5b2bf7ba73309f1c
-
Filesize
101KB
MD56248ebe8239384b253fa1f9e37180941
SHA17021d2fe53bca6fff06db05fb22b673b7432c72e
SHA256dc9a3655ca8fd9aaa8be1e58d0399e8a8170c0616ecb279bdf18da7869ad343a
SHA5126ff610e050892f6f583233a72f699bb2ec2ebbc575fe240f7f44624e6ea7e588d4980e9a4e47435a0f643e5fbd1d9a20c93af6bc5ab3b12f2b3e16614970cafd