Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 13:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe
-
Size
285KB
-
MD5
3611ab527d19120df298c28fc77e351f
-
SHA1
928ec2293ba14c0b52e03ff39a05049f355fc654
-
SHA256
5368e5a5e0ffdbc64ecf8b37f6f0b10765ecef0793517ab113cc2669d7ac80a1
-
SHA512
d0da50e4b3685f916759f897d9c16f61b128e14e0d94fb16b731a785f08f744d60b30b7a8df35ede2200e4edfc870dcbc044506f48f5ce5a1ad5b6d030ed2a90
-
SSDEEP
6144:q3PJYTtoMLh+3p26R+7O1ysus4rGLZDPb9fU2Zum:Ywcp2WuvyZDPxfU2ZZ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2096-11-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2608-17-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2096-14-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2096-117-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2172-121-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2096-288-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2096-292-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1792 7291.tmp -
Loads dropped DLL 2 IoCs
pid Process 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C96.exe = "C:\\Program Files (x86)\\LP\\F88C\\C96.exe" JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2096-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2096-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2608-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2608-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2096-14-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2096-117-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2172-119-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2172-121-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2096-288-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2096-292-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\F88C\C96.exe JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe File opened for modification C:\Program Files (x86)\LP\F88C\C96.exe JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe File opened for modification C:\Program Files (x86)\LP\F88C\7291.tmp JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7291.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1600 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2772 msiexec.exe Token: SeTakeOwnershipPrivilege 2772 msiexec.exe Token: SeSecurityPrivilege 2772 msiexec.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe Token: SeShutdownPrivilege 1600 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe 1600 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2608 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 32 PID 2096 wrote to memory of 2608 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 32 PID 2096 wrote to memory of 2608 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 32 PID 2096 wrote to memory of 2608 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 32 PID 2096 wrote to memory of 2172 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 34 PID 2096 wrote to memory of 2172 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 34 PID 2096 wrote to memory of 2172 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 34 PID 2096 wrote to memory of 2172 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 34 PID 2096 wrote to memory of 1792 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 37 PID 2096 wrote to memory of 1792 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 37 PID 2096 wrote to memory of 1792 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 37 PID 2096 wrote to memory of 1792 2096 JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3611ab527d19120df298c28fc77e351f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe startC:\Users\Admin\AppData\Roaming\C890C\0EEF8.exe%C:\Users\Admin\AppData\Roaming\C890C2⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3611ab527d19120df298c28fc77e351f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3611ab527d19120df298c28fc77e351f.exe startC:\Program Files (x86)\0C4F4\lvvm.exe%C:\Program Files (x86)\0C4F42⤵PID:2172
-
-
C:\Program Files (x86)\LP\F88C\7291.tmp"C:\Program Files (x86)\LP\F88C\7291.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1792
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5ba58e6486e865ef739478e333c376ce5
SHA101ce5d6c38a9b50aa159b58f87f10dba1204c1da
SHA2566b13146a2b3434131a0bb09fa2ee316e5f04392341bfdad5de697ecd023eade0
SHA5126fede24294c4c9c5440219096bcd0c087b05367c2b88a7ce2324ca7abfc3ca99d25401798bf046f5d4fafbf06f83f80d5032091e4b4d0414c8f76328fa6ea8c8
-
Filesize
600B
MD58d3a5e1062cbbd9ef6b25ce0752a2dfa
SHA1ea0df26f2007fcc61e18f83792a106e50c602748
SHA25647f1325da2142954a2a0e07fa154d8c4d89be4a413ca029d1f5cef78f52ece17
SHA512a7503374a253b070977a84d69922296793f2d953605a8288dd26dda2bfc8f47de78b11a11aacc7b0aa954451fb62c66608a873965bf22bfa2f9a7bbae1779922
-
Filesize
1KB
MD58fddc14f62ed0fca13e50f9f01754123
SHA15f2af1ba82b3b5a2c545d4e6eb0128f2d2026a82
SHA256a6a2ebab446917d8594702d0313440cbd08e654994ceefb48e20c0a74021fb00
SHA512560470f7aba942544141545e6816493e093879dc894aef3fce148f3801f63fe3208caf4070188e9e68a2db966058263b815b518e6a14a755d91fdc83c551be55
-
Filesize
101KB
MD5d05e213f1756ab068c1d0c2ff369f13f
SHA1d4fd2de345b7cd63a60f74529cef21c2ef1ddd02
SHA256e66de59c866eb7d4576a153630b056450c79ca0a1063c09e3f46223c144d4db7
SHA512f713d260921e07b8521de257548630439375f574e2fc68bec305809e80df6d70a1674642e94572aecd6e3692a64587f3e9e5f3506ea6dadfd9cc46aa3f7e8422