Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 16:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe
-
Size
276KB
-
MD5
1908ab6d26e6326da28684182a90f101
-
SHA1
1e7006908ec23cfb263b7715f7c2146116c00a8b
-
SHA256
a3ee5513d7b4a45e0443d914b343b7e7f0127b67661ce28f5e2bb939fef739a8
-
SHA512
b46325f239eeef51f165dc4534608f5e089c3c2c55e1bfdc7e4ce773de2cb0372ac1ccac313cc8906e85f1debbe78dad1587c8d1b2bc403592b2d168b7f31b69
-
SSDEEP
6144:hQFbHhfUo3rTACgHk+YZPnO+ws75v6HyND/mMwecBt:hYBx3rcfERfOO7iy/mM2
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/576-13-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/576-16-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/588-19-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/576-136-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1780-138-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/576-321-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/576-325-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 904 6B9F.tmp -
Loads dropped DLL 2 IoCs
pid Process 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\18D.exe = "C:\\Program Files (x86)\\LP\\D058\\18D.exe" JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/576-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/576-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/588-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/576-16-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/588-19-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/576-136-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1780-138-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/576-321-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/576-325-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\D058\18D.exe JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe File opened for modification C:\Program Files (x86)\LP\D058\18D.exe JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe File opened for modification C:\Program Files (x86)\LP\D058\6B9F.tmp JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B9F.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1968 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2248 msiexec.exe Token: SeTakeOwnershipPrivilege 2248 msiexec.exe Token: SeSecurityPrivilege 2248 msiexec.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe Token: SeShutdownPrivilege 1968 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 576 wrote to memory of 588 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 32 PID 576 wrote to memory of 588 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 32 PID 576 wrote to memory of 588 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 32 PID 576 wrote to memory of 588 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 32 PID 576 wrote to memory of 1780 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 34 PID 576 wrote to memory of 1780 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 34 PID 576 wrote to memory of 1780 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 34 PID 576 wrote to memory of 1780 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 34 PID 576 wrote to memory of 904 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 37 PID 576 wrote to memory of 904 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 37 PID 576 wrote to memory of 904 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 37 PID 576 wrote to memory of 904 576 JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:576 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1908ab6d26e6326da28684182a90f101.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe startC:\Users\Admin\AppData\Roaming\8B8F7\D97D0.exe%C:\Users\Admin\AppData\Roaming\8B8F72⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1908ab6d26e6326da28684182a90f101.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1908ab6d26e6326da28684182a90f101.exe startC:\Program Files (x86)\F72E8\lvvm.exe%C:\Program Files (x86)\F72E82⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Program Files (x86)\LP\D058\6B9F.tmp"C:\Program Files (x86)\LP\D058\6B9F.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:904
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD594ce4488585eebe2dee7b249def18cca
SHA11889266a13acaa38f1f784abc4149e27643d6b34
SHA256642872be6e1673c92b11ea039d67c277dcf2716fef1aa965f93dd515f7e318e0
SHA512a695cee0be94da4570f1e35aed3fe629f5d2ecf4cf169abb17b0e8f50233573378d1f50e66361d116626f7ddf352cb77380f2bedd0ac40479228709a22e22b3f
-
Filesize
600B
MD5f50f3037825bcd8535899ff75459d043
SHA190bc8acc20e14d4d2baf2e353d8c59360fd58365
SHA256e8ca3f128f95fa1f2b0d56253dac19d83bbccc04e4bd554dda0bbefea3102cad
SHA51229453b31b1ece6f34f7f60e23eba2fc98b41a6dbdf4bc8b178e411df2bda69bec2e008c13a9a9287ad7f973e7183e19c0203f60776f3deb86726061f23c16e9b
-
Filesize
1KB
MD5fc824724e7fdfff7805c01616415dee5
SHA1cdaa6aac961f24e530ea13232a330e7708a8cb88
SHA2565db38ea0165fa20ca7d335a95966b67386e13825fa93977d6b2b8a29a58757e6
SHA512d6012a349a4d8df9c4dbdd314b9f0e4941b7a81964f26ff797e0ca449bb3279e96ecf257b659a73d3a6603ed3b339284f3026791bd97d9d20d0e5e274b334b55
-
Filesize
97KB
MD508df2b9be15594b345d79bd5535ac84a
SHA1eb968f7bbf3b7d680cf3f7d2ebbd7f3f144db432
SHA2566a6a071e5db43185d023fa676a2ba483c1c67a8364c120dc600a401028535a57
SHA512f6639fdc7bf6ec2e722bc0548f2a5be3c5dec18487aca110afb9f5a6353066d003f158d26c365a950d2aed73bae408f3b9160815801e0fc952837f01c3e3179e