Analysis
-
max time kernel
140s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 17:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe
-
Size
281KB
-
MD5
0fc2b98cfb24bbfbbdfdb5b5977eda66
-
SHA1
fa0aae2db8b9df67aa72687e9f6d6299723404e9
-
SHA256
7f3ad22dc3f87ef66820073e19ba18b4a5c7bebe116064357925e1fd086d8046
-
SHA512
ca33e8282df8cc25613123ad9c00eb963eef855faeab1c012d75dad038fce3b278767d9df4a31f9411b3e02636535722e26835ff2303650647e0dabe95652e57
-
SSDEEP
6144:FrItOCOnuagl3h/KZVLi9adKAjgta1Bc2jA1TFdPYT:PNuaMcow1gKFyTP8
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 9 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2028-3-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2028-8-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2028-13-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2504-17-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2504-18-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1100-104-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2028-105-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2028-193-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2028-199-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 908 A9E6.tmp -
Loads dropped DLL 2 IoCs
pid Process 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FE4.exe = "C:\\Program Files (x86)\\LP\\1C35\\FE4.exe" JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2028-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2028-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2028-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2028-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2504-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2504-18-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1100-104-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2028-105-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2028-193-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2028-199-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\1C35\FE4.exe JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe File opened for modification C:\Program Files (x86)\LP\1C35\A9E6.tmp JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe File opened for modification C:\Program Files (x86)\LP\1C35\FE4.exe JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A9E6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1932 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeSecurityPrivilege 2556 msiexec.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe Token: 33 1688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1688 AUDIODG.EXE Token: 33 1688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1688 AUDIODG.EXE Token: SeShutdownPrivilege 1932 explorer.exe Token: SeShutdownPrivilege 1932 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2504 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 30 PID 2028 wrote to memory of 2504 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 30 PID 2028 wrote to memory of 2504 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 30 PID 2028 wrote to memory of 2504 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 30 PID 2028 wrote to memory of 1100 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 33 PID 2028 wrote to memory of 1100 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 33 PID 2028 wrote to memory of 1100 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 33 PID 2028 wrote to memory of 1100 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 33 PID 2028 wrote to memory of 908 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 36 PID 2028 wrote to memory of 908 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 36 PID 2028 wrote to memory of 908 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 36 PID 2028 wrote to memory of 908 2028 JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe startC:\Users\Admin\AppData\Roaming\5B4EE\7451C.exe%C:\Users\Admin\AppData\Roaming\5B4EE2⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0fc2b98cfb24bbfbbdfdb5b5977eda66.exe startC:\Program Files (x86)\EEBDF\lvvm.exe%C:\Program Files (x86)\EEBDF2⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Program Files (x86)\LP\1C35\A9E6.tmp"C:\Program Files (x86)\LP\1C35\A9E6.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1932
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵
- Suspicious use of AdjustPrivilegeToken
PID:1688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b0157cb83cb1af5c3a12f32b9951d997
SHA1f5b7dc82ecb97fd60e44f9c21202bb9a15174444
SHA25659ce869b0a3b693d825c0d70758abd27d5c78a3ec30181915712e97d4d5041a5
SHA51253a5c4c1d24c73af210618905d029f0e9e703aad75b49a7518a6c68dbe6577a77f7a0d7c0e6adeba92d9a68bfb234b1f46e3a4bc5ebec98d24ba6b5576e3e4b9
-
Filesize
1KB
MD5811833c0426b441113dcd2ee3c3c6cc5
SHA12bbbff5fdb2373923ec4d2ea1990ef71a4749d1f
SHA25648a9fa7853a7a4b1e126cb3d9161cb45a5056c74dc2b4f5f0c2c64ebf9cba90c
SHA5127e76249137fcf7561c545f5504aeb2bee4666687efedcaf2b236084193b91d55e8315b8e6caf19b533c3e82c77c0428abb922d19a672b7e1fb465eea48fd5579
-
Filesize
600B
MD58bcd2c01efe4da66363cf7300ad214e0
SHA107e9fbbdf78bdbeab3963814535252846804643a
SHA256392f2ea87408a69d53816d353b4fc05d77bd87eba28e06a24beb71660421d186
SHA512af573591f0fe221cdb64102922f2d76d909c64402b47b2fd2dfe96188deb0aea737290dc0764925352a09e1b4c3f1ba16a66f5ad73e4ae8173d4bf733eb87631
-
Filesize
996B
MD54abf222baef279147238d586530554a7
SHA1c7e0ee9acb97843956ef571f024e57f211de40c2
SHA256335b87b74ff77f4a0507fb47ff0af9620f1cc3a8c8c1c05734c6f975ef652c5b
SHA512a5ffd310d0ceb911452682e5de8a20d6d796ba1d5b740a96057358730ccf80706f35ee84a2ff602a32b074741b78f9ff826bf3d74bf33246016113db9e07fe73
-
Filesize
100KB
MD5cebf9d7ad1c7bdf8bf16323c6407a8f6
SHA157b9394fb956f64edd375fd4a2a1a744e3d0fe60
SHA256a66bc0c217371b5b06cbc8bd4acc115412a55661a8ef477ae65da84b5c3dbcb0
SHA512ca386c52e28353c72b410477607c43c95a0e484f748bb792aa4fe25e011fcb4e8c2a141039845223d0ad6ce6c2e0d24f6977076816eb5572eb222324d9c62461