Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 08:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe
-
Size
285KB
-
MD5
3d8f7dcbbe857b54f6932b4b75ccaf61
-
SHA1
41668cd07769e6c7d8b5c9548dbe49c79222b79d
-
SHA256
460f2e61383cb31e73e109dc6d07ad154c403f7066cbd27836a500aca798df0f
-
SHA512
fb375d7924d81fb22f05e7006c4bf1a99ca1360342b86556feadb293910598feb6584842ad481ac047ef47913aa8a1393c3ade03e52039d286aad1291eb73143
-
SSDEEP
6144:pt+0Ju+y21IszRyAB3pKE7rrmhmOKdd0K6PfmlYM1T:do+y2S03HHrm1QP6Pfm
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1932-11-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1932-14-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/620-16-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/620-17-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1932-73-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2124-75-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1932-195-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1932-198-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 768 84A.tmp -
Loads dropped DLL 2 IoCs
pid Process 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\F8C.exe = "C:\\Program Files (x86)\\LP\\EA35\\F8C.exe" JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1932-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1932-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1932-14-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/620-16-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/620-17-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/620-13-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1932-73-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2124-75-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1932-195-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1932-198-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\EA35\F8C.exe JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe File opened for modification C:\Program Files (x86)\LP\EA35\F8C.exe JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe File opened for modification C:\Program Files (x86)\LP\EA35\84A.tmp JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84A.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2504 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2980 msiexec.exe Token: SeTakeOwnershipPrivilege 2980 msiexec.exe Token: SeSecurityPrivilege 2980 msiexec.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1932 wrote to memory of 620 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 31 PID 1932 wrote to memory of 620 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 31 PID 1932 wrote to memory of 620 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 31 PID 1932 wrote to memory of 620 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 31 PID 1932 wrote to memory of 2124 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 33 PID 1932 wrote to memory of 2124 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 33 PID 1932 wrote to memory of 2124 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 33 PID 1932 wrote to memory of 2124 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 33 PID 1932 wrote to memory of 768 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 37 PID 1932 wrote to memory of 768 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 37 PID 1932 wrote to memory of 768 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 37 PID 1932 wrote to memory of 768 1932 JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe startC:\Users\Admin\AppData\Roaming\5E87F\ACAEA.exe%C:\Users\Admin\AppData\Roaming\5E87F2⤵
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d8f7dcbbe857b54f6932b4b75ccaf61.exe startC:\Program Files (x86)\7F03D\lvvm.exe%C:\Program Files (x86)\7F03D2⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Program Files (x86)\LP\EA35\84A.tmp"C:\Program Files (x86)\LP\EA35\84A.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:768
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bf3ffa73680e831d9d500a6a0b96cd59
SHA110f6e85525168a0f4068d2948358663771012f7c
SHA256e69de71725bd9d470051c6ada2ec823b2145d644bff6e0280f39b1cbf1d77b06
SHA512028064eba9622a308c1d6f1bb4b64c3a97c0b6b586d107c730d1db536c1b4134d8f85f6c69590463450d00f92ac76d284acf42fa80fb0765a42e5d17b11517a9
-
Filesize
996B
MD554a7df12c2d72a9ba665ccafd011a5aa
SHA17c30a34d22cb6c06256fb087143201e5b846732f
SHA2560666868bcb7d8b89beceb8ea5b2151eea209da0df0c542c880a78b53fe951d2e
SHA5127f2599a221713287b37393668d7b3a15321f9218d366eaf0796fa301a6f8c1d34f3279b54575b23e44e681e91871fca92af56ebb53b833585aa401500a1896a4
-
Filesize
600B
MD519d6e49b6a178c3bdbc037544f8a7476
SHA19dd15e55dedb11b4235af5ba39843055e6aa42cb
SHA25694436e7ee457684fb7d6d5fc0f963fd2c519401f30b651e4cf7e7bd6571520b2
SHA5127532887a51681a18ff8e631c804e43d81f1379828a862e7fd7ce0e7f11e567406dd7f9692379a555b3e3a45f13063fceff2b2bb4688960d91062cd05c4729fb5
-
Filesize
100KB
MD5c065eefcda0d07ac65dc1e74db62936a
SHA126a8bf8497c47b5152f85d483f1bc4ef978b8d7a
SHA2560203080c18c7cfae8ec31e1e10377364017c0ea875743162d4a8608fe484bfba
SHA512ff8ff2ce83e236e204bc39ea09cde644ef3923fbcf776507864185d35a557cee379245062fd6c6bbe247a4f01bbe3d5acaf41ab328a3ca0576689a557613745a