Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 17:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe
-
Size
705KB
-
MD5
065fd42adeb6f5b386f31c3f0214e387
-
SHA1
e1e90af8d8bbd94736d69b78a8d676b849e3a834
-
SHA256
4c472c8e44ae01c34c971406ee5fe036c8ff64cda188607b10e8cf5ec62f6758
-
SHA512
9813f4c2a817b01fc2534d519fa470b2b5a2c11109a0ea24778dc7bdaa092889178cc56632ccc6e082127d9cbd06ddd62b2047b14cc0398cf8e0d397b6ddd411
-
SSDEEP
12288:U5OP5nmui+H6CTeohp66QS4eLkT8+eAtPa9jAWRmlzBegUCnYS:UIP5nPiLueoHl4eypa9k8mlceYS
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2804-16-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2804-28-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2804-29-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1300-31-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1952-131-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2804-190-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2804-302-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2804-308-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" readme.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 4 IoCs
pid Process 2804 readme.exe 1300 readme.exe 1952 readme.exe 1448 1.tmp -
Loads dropped DLL 6 IoCs
pid Process 2904 JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe 2904 JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\2F2.exe = "C:\\Program Files (x86)\\LP\\B8A5\\2F2.exe" readme.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2804-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-28-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2804-29-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1300-31-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1952-131-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-190-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-302-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-308-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\B8A5\2F2.exe readme.exe File opened for modification C:\Program Files (x86)\LP\B8A5\1.tmp readme.exe File opened for modification C:\Program Files (x86)\LP\B8A5\2F2.exe readme.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language readme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe 2804 readme.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1308 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2980 msiexec.exe Token: SeTakeOwnershipPrivilege 2980 msiexec.exe Token: SeSecurityPrivilege 2980 msiexec.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe Token: SeShutdownPrivilege 1308 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2804 2904 JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe 30 PID 2904 wrote to memory of 2804 2904 JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe 30 PID 2904 wrote to memory of 2804 2904 JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe 30 PID 2904 wrote to memory of 2804 2904 JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe 30 PID 2804 wrote to memory of 1300 2804 readme.exe 32 PID 2804 wrote to memory of 1300 2804 readme.exe 32 PID 2804 wrote to memory of 1300 2804 readme.exe 32 PID 2804 wrote to memory of 1300 2804 readme.exe 32 PID 2804 wrote to memory of 1952 2804 readme.exe 34 PID 2804 wrote to memory of 1952 2804 readme.exe 34 PID 2804 wrote to memory of 1952 2804 readme.exe 34 PID 2804 wrote to memory of 1952 2804 readme.exe 34 PID 2804 wrote to memory of 1448 2804 readme.exe 37 PID 2804 wrote to memory of 1448 2804 readme.exe 37 PID 2804 wrote to memory of 1448 2804 readme.exe 37 PID 2804 wrote to memory of 1448 2804 readme.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer readme.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" readme.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_065fd42adeb6f5b386f31c3f0214e387.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\readme.exe"C:\Users\Admin\AppData\Local\Temp\readme.exe"2⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\readme.exeC:\Users\Admin\AppData\Local\Temp\readme.exe startC:\Users\Admin\AppData\Roaming\54B0C\62FB8.exe%C:\Users\Admin\AppData\Roaming\54B0C3⤵
- Executes dropped EXE
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\readme.exeC:\Users\Admin\AppData\Local\Temp\readme.exe startC:\Program Files (x86)\0CFCD\lvvm.exe%C:\Program Files (x86)\0CFCD3⤵
- Executes dropped EXE
PID:1952
-
-
C:\Program Files (x86)\LP\B8A5\1.tmp"C:\Program Files (x86)\LP\B8A5\1.tmp"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5894ad316802bc308898741704c48ad27
SHA1384f496e621ef9ffb64bc369bff696a65cbc9113
SHA25680454ba27f01d0e4b8a8e1185a064f994223b81db463c760f315a2e7168b7fc5
SHA512e155974f82193073a30906d7c5b319667c1b9f1f9f7ba951bd444c565f20d7c54a118b31afbaead45fce7773e4066aa535a7565e873f4015b8ab4e73a523f1e1
-
Filesize
1KB
MD512e9e4c9824a87ac6faadccb09d8e0ba
SHA190f0850f489f87e885df99c7dbdcf9a5ef39d0d2
SHA256a33ef1eeb55140211ff3457b68a642ef76ceaab7fe5731ace2f2c852debcdcf6
SHA512e3c4c7233a13c2c819ce91d81f385a7852c25009a795b2e129d42cc5e16b0233c7eea790a9386ccfc579c484a1ccb2bcacc77a36eeab699808833793803c2997
-
Filesize
1KB
MD59ae6411288de951afeeaf65714a0e747
SHA1634757e63324140d5f4516f2c1b4f9a928573034
SHA2560bf2d18adc1d04f20f0282df16c622971b63a6f21aca913396f7d8f7a8d4c2d9
SHA51238e0cf27b15f19de2b47c0a31681179b497e0b912059b0122d946446a4632f23c4c315163eecf58e62016980f1714f93096946175c4f426ee450955d5025598c
-
Filesize
600B
MD54ec7c4f6085a414182aa5ec8137b1f6f
SHA1a17282b42be35bf441005e70034da4f4ded506a3
SHA25647ab469c4f1aa484890fe32d761b286573f2f1067f7a3a1826f11689ea77ae85
SHA5123321846e165f56d27888b043375e01670c666ca1dd9bfc3d51a79546d3e9f355cfeb91a24cc5df16c66fd4f9b8c7789afee32664a11eab293ff0d167640c8d8a
-
Filesize
102KB
MD53dd4e5cd0cb32f735268a740c647065a
SHA15e88431137152bf76f61d06b1c2086ecd5082a76
SHA256a1cb303db454c3faa73fa6705c9a7ce126110615879047fbd579d2c813fba535
SHA51237463297b6e127dc2689f2b998b14042189baa26727ab1770fc482035b09df2cd3f349fb11038fabde84d0b4a5a07bfc6b5c619001ddc70c9c37c0aa87b3fe04
-
Filesize
288KB
MD5bf0cf607fb51358ed9c37a72032d89b9
SHA1b60376370d5d065ee2165d28bac41fc1c5c9f4fb
SHA256736c96ededa58c9ed19f0792446a5960622b0d5c6aefcc37e5b5ee8aa76c748c
SHA512c9d3db8651bd841289945ef16f3e1c04665cc9db4ef6c2264356132c6cf032731d55881de67a6d79148364b3a2c7d52129aa9145ab5245b06eac3100f19da366