Analysis
-
max time kernel
140s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 01:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe
-
Size
266KB
-
MD5
1cbabdf51e9f12483e13a7b633648b2a
-
SHA1
4f4d666e3ac32fb7970b814f92ab0d5fba3484c8
-
SHA256
5c2ea538e2cf268bdd7db876c213dbe2f8f2f439860567206144d6f3376ac01b
-
SHA512
eeef6944c5532d0bc3965b7ea31ee1b186564f6b3dbfb0cdc50ea986e709c0c8b168e9968cd4c07116c7e1bebde6e1924ca4392cb1fbb6a04168d8f99c848df8
-
SSDEEP
6144:g3UdEwOA6TAk/HFIfbYghLgLn8OA1btP2Xv0Ny/Hc+F5jDD7s2K88:gkdE3TRd6MD8OaBP80Ny/HcQNf7s2K
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/528-13-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/528-15-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2068-17-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/528-134-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2384-137-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/528-312-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/528-316-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1836 3D8.tmp -
Loads dropped DLL 2 IoCs
pid Process 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\0E0.exe = "C:\\Program Files (x86)\\LP\\61A0\\0E0.exe" JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/528-3-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/528-13-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2068-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/528-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2068-17-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/528-134-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2384-136-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2384-137-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/528-312-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/528-316-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\61A0\3D8.tmp JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe File created C:\Program Files (x86)\LP\61A0\0E0.exe JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe File opened for modification C:\Program Files (x86)\LP\61A0\0E0.exe JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3D8.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2856 msiexec.exe Token: SeTakeOwnershipPrivilege 2856 msiexec.exe Token: SeSecurityPrivilege 2856 msiexec.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: 33 1488 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1488 AUDIODG.EXE Token: 33 1488 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1488 AUDIODG.EXE Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 528 wrote to memory of 2068 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 31 PID 528 wrote to memory of 2068 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 31 PID 528 wrote to memory of 2068 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 31 PID 528 wrote to memory of 2068 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 31 PID 528 wrote to memory of 2384 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 33 PID 528 wrote to memory of 2384 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 33 PID 528 wrote to memory of 2384 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 33 PID 528 wrote to memory of 2384 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 33 PID 528 wrote to memory of 1836 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 37 PID 528 wrote to memory of 1836 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 37 PID 528 wrote to memory of 1836 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 37 PID 528 wrote to memory of 1836 528 JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:528 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe startC:\Users\Admin\AppData\Roaming\085D9\5FA61.exe%C:\Users\Admin\AppData\Roaming\085D92⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cbabdf51e9f12483e13a7b633648b2a.exe startC:\Program Files (x86)\D91DE\lvvm.exe%C:\Program Files (x86)\D91DE2⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Program Files (x86)\LP\61A0\3D8.tmp"C:\Program Files (x86)\LP\61A0\3D8.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2668
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5341⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD549e6af1f853d1c4de567fd8286222791
SHA1041fce984b740d11dc62d7b4f9a09cd78610396f
SHA25676e55856bde6198b28b5f8199be2e3fac6192899124a1788ea662f201aa12a22
SHA512ddf4e5369b2f01f56bc109ae9ec150d70b16858fad66e6a35c7f9ef34b76556eb654b5c4ea55154c11e406dce531c2adf5cc549637f32302b485dcae5a4c0a9d
-
Filesize
600B
MD5e17c175f31f01cf2023cb1031069ac0d
SHA182a3f7c281108f788a158eec411d234f05a73ee6
SHA2564017c7dd66290342a8225890fd971b2f0da593b2e6fdaa08da505e95c2052038
SHA512a2d861edc7043c9358e581eb02048dd4a731b41c88ad9a62cca496679b309d208c07e4cc75f524cb96b571fe60323a2a1b6d0b4c684ff48639844ff502a00f03
-
Filesize
1KB
MD53600942876be86958e65a9bcbe9f7208
SHA1e9594aa2db7463091d851ca7709ccd666875c969
SHA256f1491a6caffc55e0d7ae4ef73d84accebea9797eb3ff15c7fe5cfc4ca5f61fa8
SHA51206674bf8be939bc2be9ab227a6dee7d389f0833ad8ec81b5dc05a0da9e1a6bef998ea00510d00fa64c0f4adbac51d826f33a769d49e333bfa46b05b410b6d2a9
-
Filesize
97KB
MD596927b650398afcb870ecdcdd24700d1
SHA165ffa36363861a524a21689efda38723b40e2bf1
SHA25659a70ee622f4af7b5e932e6e66d49d58a79d700e0fe80fbf4dcbf586abd2c05f
SHA512dd99b6f2370376d8967ce0808b9501b79230eb57f1d695304368240f3c4353516ee29f207da70c22f74ccf64eeca8a89893e3d8071b96db3e58834ee5aca4df9