Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 10:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe
-
Size
279KB
-
MD5
20b2937b7b757af9baaf2ae7be88140c
-
SHA1
5c69e5b92e5fa49894a25b884b31a0af95a4cd3a
-
SHA256
5d08ec9ab8e3a1bd3731edb0cf9590f1df492ca27533c8a95e975fced9d0a286
-
SHA512
97dbde937d747e34ef0aa4d21b5f2e104cb6d1b357ba3905beb20c919b4caf346dfdbc3e893128753a351badaa700c960aa3bd756c6607899e14a3c01518d097
-
SSDEEP
6144:8P/dgEK6Q5+u+beL3+v2iFp/7SyY2ukmYmKHVgyg:8PT9roPiz/7DXukfmMg
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2432-3-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2432-13-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2960-17-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2432-15-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2432-86-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/628-91-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2432-198-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2432-201-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1048 F595.tmp -
Loads dropped DLL 2 IoCs
pid Process 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\747.exe = "C:\\Program Files (x86)\\LP\\7E6B\\747.exe" JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2432-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2432-3-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2432-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2960-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2432-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2432-86-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/628-90-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/628-91-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2432-198-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2432-201-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\7E6B\747.exe JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe File opened for modification C:\Program Files (x86)\LP\7E6B\F595.tmp JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe File opened for modification C:\Program Files (x86)\LP\7E6B\747.exe JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F595.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1356 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2864 msiexec.exe Token: SeTakeOwnershipPrivilege 2864 msiexec.exe Token: SeSecurityPrivilege 2864 msiexec.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2960 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 31 PID 2432 wrote to memory of 2960 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 31 PID 2432 wrote to memory of 2960 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 31 PID 2432 wrote to memory of 2960 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 31 PID 2432 wrote to memory of 628 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 34 PID 2432 wrote to memory of 628 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 34 PID 2432 wrote to memory of 628 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 34 PID 2432 wrote to memory of 628 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 34 PID 2432 wrote to memory of 1048 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 36 PID 2432 wrote to memory of 1048 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 36 PID 2432 wrote to memory of 1048 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 36 PID 2432 wrote to memory of 1048 2432 JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe startC:\Users\Admin\AppData\Roaming\BFE4E\D117E.exe%C:\Users\Admin\AppData\Roaming\BFE4E2⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b2937b7b757af9baaf2ae7be88140c.exe startC:\Program Files (x86)\4E349\lvvm.exe%C:\Program Files (x86)\4E3492⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Program Files (x86)\LP\7E6B\F595.tmp"C:\Program Files (x86)\LP\7E6B\F595.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1048
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD504cc2f7d6d78ed84b89961c14234e5a0
SHA1e448148f79c85b1e67c5b10153a96d84275005e8
SHA256ea100e175e12befb8f923e190faa0dcfa139145cab9c4e4b2da23b4355bcf098
SHA512edb6137ee59b429fb63067e52452baab5cb92502980100e62beb6c20eca4fdc72150ed3cfab1849ba88654d8e32cd5a8852a2c6c19211e6c93fa0185c16445ef
-
Filesize
1KB
MD54ba4c729e93344abc1b6e73f9bc3c0be
SHA13d3ef5f04be49dd0bdccf0f6950244346e4858cd
SHA2567f605d0ac0b3b48c4eec59d8a5adb86a1cf875b81b63ca7da9265a0a55a5a5b9
SHA51264dd10bc13180fcd9124e4931ec468bdbafdf14c378d4dc3787dd7696b3b5ae3c04c3fb5a8ae3ead353bf2201e30a9bc754771f66a545edddb24059ebaa5a753
-
Filesize
600B
MD510e9a78e708163106efb2249d2ae5d70
SHA1ce0789720a862c17a8384c508d69ac834ff381ea
SHA2562f5633943b7b11fa9a212867b6c0b666497c150ee999d1c77569f117f074bdda
SHA512e4ead3dd1fb2a694dccf80232dc6e561b6cc0ca7a23685cbb358b5493545b18f1b016939445e60a64ae13db508c97e4bc8a38756c52b0f9c3997fbbdac741e75
-
Filesize
98KB
MD5c465b48ab563947d31ba4e373991f6b0
SHA1d1995bc15dd53facd219db97aca8866633afed59
SHA25623dfd5ff90356ca2694ce2987af9ecaf0a9ee04e73d4c860ba7419daa1823397
SHA512227c8ab10cfc8760fba8b96991d8192e98ba284abfd309bb39fda20ed6474776b70024b180da36277844cc0d538e33635fcc1eeab8f6cdab6bc80c221bb6ff7f