Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 22:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe
-
Size
177KB
-
MD5
442059cac43d01d07ade2b406cb4b479
-
SHA1
a745ebfa7e26de31017e9df35f8041f36f960244
-
SHA256
9a5408f93ab95b1323b4717fc9aa491f0cb8eea6c35651bd6205e55a646107c1
-
SHA512
d886e63778f85ec536848fd79f6005a1686a81beadf1d61c4e1a61e80dcd0ce109bb2d7fbd61ed84c778c30bf397bb6b0c494dfde8b321249966281c90978365
-
SSDEEP
3072:ZEfjF3/el3EEDWobFxQpseuIBU/p8ZtfeG47RMIELEzJ4D3TPOlHDRu3:CfR3YpxWsebBi8X2H76ZkuDjmdg
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1120-16-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2296-17-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2296-18-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/1052-83-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2296-84-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2296-155-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2296-183-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\828.exe = "C:\\Program Files (x86)\\LP\\3DDD\\828.exe" JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe -
resource yara_rule behavioral1/memory/2296-3-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1120-15-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1120-16-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2296-17-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2296-18-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1052-83-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2296-84-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2296-155-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2296-183-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\3DDD\828.exe JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe File opened for modification C:\Program Files (x86)\LP\3DDD\5F01.tmp JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe File opened for modification C:\Program Files (x86)\LP\3DDD\828.exe JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1604 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeSecurityPrivilege 2256 msiexec.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1120 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 32 PID 2296 wrote to memory of 1120 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 32 PID 2296 wrote to memory of 1120 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 32 PID 2296 wrote to memory of 1120 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 32 PID 2296 wrote to memory of 1052 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 34 PID 2296 wrote to memory of 1052 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 34 PID 2296 wrote to memory of 1052 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 34 PID 2296 wrote to memory of 1052 2296 JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe"1⤵
- Modifies security service
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe startC:\Users\Admin\AppData\Roaming\D10CA\AB23D.exe%C:\Users\Admin\AppData\Roaming\D10CA2⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_442059cac43d01d07ade2b406cb4b479.exe startC:\Program Files (x86)\CA07E\lvvm.exe%C:\Program Files (x86)\CA07E2⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD578a8944ecbea7c9752fbcfd1a7ef48e6
SHA13466217b40f14cec5552bb6ebe338b10a3342efc
SHA256f9f147b123c1491dc81c07bd765a8a38813ef9a33de2e75bcea1ef550e32db79
SHA51278fd160db511d1caef0e5aba5dddcd9a41411f53190cfc70a22b3bfeab57951e9912f2e1fcdf1eedd7314ce1dd09c4946b0d9c71e397d840300869dde139db6a
-
Filesize
600B
MD55a4d5cf7266d5468d3000d25c5eb6887
SHA1bb98b8b94d2ea183e35b4a82be71ead8684fb668
SHA256c113cdc3f5fa768439b82214ba69de16e9e5b38996051e1a6fd80dd853d1df61
SHA512e19c101ec0af40877bad91948ae3006557514eeeacc4cc1295c478bfa53103e40d4802d606b20545c575e6da9905e90a0331fa0c4b9592f65a86f73320861a32
-
Filesize
996B
MD5ea1821dbe138d0b9386e621b3ad77a71
SHA148f460f004f3936cd985ae17361be640c3417a05
SHA256c452b4173f439cff32215d50c8db27a7b8f10f02fb1f97016d2285d52b2c99bb
SHA512bde822fa29a8c5dbeb1e44861ad67f13b6995dd35a8be8b738e72abec74dae93b69811f4fc6e88d1b085283fd4bfa0a718813e12dc7e28f2b00141f1cc464078