Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 06:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_02a61527bc5c042bab481de408da182b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_02a61527bc5c042bab481de408da182b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_02a61527bc5c042bab481de408da182b.exe
-
Size
285KB
-
MD5
02a61527bc5c042bab481de408da182b
-
SHA1
836aa96845dee3113b24cc866bd7dadcb80b4f84
-
SHA256
31ef9774e079c82c2fe837aa9e60e53c176886d0c5f9ba76143e620ab4eb7572
-
SHA512
b3a4818037e10867d5a6c68e302bd06bc67012a74ce1f3c93e91d5771b013cddfb23df75038b058b3c03d1a7048966e913618eb60a2eebfa5ba9941e335526ef
-
SSDEEP
6144:O9j17tjCWXkANmZGceQhAmrf+jTCWdCJqv8+nY:a7jCekoD5QmIaTCWYJqv8+nY
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 9 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/292-3-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/292-4-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/1376-17-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/292-18-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1376-194-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/292-195-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/292-322-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/292-328-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/292-332-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_02a61527bc5c042bab481de408da182b.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1640 27BC.tmp -
Loads dropped DLL 2 IoCs
pid Process 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\533.exe = "C:\\Program Files (x86)\\LP\\A508\\533.exe" JaffaCakes118_02a61527bc5c042bab481de408da182b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/292-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/292-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/292-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1376-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1376-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/292-18-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1376-194-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/292-195-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/292-322-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/292-328-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/292-332-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\A508\533.exe JaffaCakes118_02a61527bc5c042bab481de408da182b.exe File opened for modification C:\Program Files (x86)\LP\A508\27BC.tmp JaffaCakes118_02a61527bc5c042bab481de408da182b.exe File created C:\Program Files (x86)\LP\A508\533.exe JaffaCakes118_02a61527bc5c042bab481de408da182b.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_02a61527bc5c042bab481de408da182b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_02a61527bc5c042bab481de408da182b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27BC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_02a61527bc5c042bab481de408da182b.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 1744 msiexec.exe Token: SeTakeOwnershipPrivilege 1744 msiexec.exe Token: SeSecurityPrivilege 1744 msiexec.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 32 PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 32 PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 32 PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 32 PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 36 PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 36 PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 36 PID 292 wrote to memory of 1376 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 36 PID 292 wrote to memory of 1640 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 37 PID 292 wrote to memory of 1640 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 37 PID 292 wrote to memory of 1640 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 37 PID 292 wrote to memory of 1640 292 JaffaCakes118_02a61527bc5c042bab481de408da182b.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_02a61527bc5c042bab481de408da182b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_02a61527bc5c042bab481de408da182b.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02a61527bc5c042bab481de408da182b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02a61527bc5c042bab481de408da182b.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:292 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02a61527bc5c042bab481de408da182b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02a61527bc5c042bab481de408da182b.exe startC:\Users\Admin\AppData\Roaming\8C08F\733A5.exe%C:\Users\Admin\AppData\Roaming\8C08F2⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02a61527bc5c042bab481de408da182b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02a61527bc5c042bab481de408da182b.exe startC:\Program Files (x86)\8F6B5\lvvm.exe%C:\Program Files (x86)\8F6B52⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Program Files (x86)\LP\A508\27BC.tmp"C:\Program Files (x86)\LP\A508\27BC.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5a630156de9efe82142d2c2941af65f34
SHA180598c6e666112697d45df4be553798490edbdc0
SHA2562cf9bb8a1cb97b84affe707b49f952eed194363cbd03d91be06922417e2ea186
SHA512e9098c000d908f1c5e386e0be3021c5760489fac1245dfc96326ade21142693c46794a65475f164597b93a9fe1d7837113b2dda626b482866cbd0d3cf9a59a34
-
Filesize
600B
MD580214e69e9afd2110312a14ef7eb9ed8
SHA130b63da15d021659f61c4ef88da8d3671e5fe1b5
SHA25633a299c3683fb1bcf92a49ac1f1785d6ed6dffe9e10da95af06465ddc23ac38b
SHA512fabaa74665fc6548ae6f789207e6c811e40caf5b15b6144fe139f2098a2a26c6b9fb1f28de2cfa6b61cc2c7fc04c60189b7e9c2111866f032fe664e7e25c59e4
-
Filesize
1KB
MD5c4f29121faa342aff59db266bca906be
SHA1216438c17272ac6f5a581a9ba5d349e013dffed6
SHA2564064f03dc26329e4d4f0356e88dc52db3d605cd769890dbc3329b5cb2adfe69f
SHA5121261a358f1d517e706034436521736c90108f67e1f0bc70157b09092a7792eed9fc9bb936d7ba1beaa20f941cd5d37b374f0ac9d44a630204765f25dbe3c888a
-
Filesize
100KB
MD550777c38a35804872660aa71c7eb52d2
SHA1c94bdd4378d0e9f0bb2a71edca520bd49251a7aa
SHA25644761b2153a01f2cd930d6b87fc3e2ba09e8940e4d096b556e99c74f26938faa
SHA5120beaa0e126af6adab4867e40fbfe554b829a769bd22af5aad1cfe5f63d569c16c2a003d7b98724efdf8fe255b6c8b124487c999db70c2012ba68faa130fa9ce4