Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe
-
Size
265KB
-
MD5
3fcd7962dac63e112a23c95f64a7a2e1
-
SHA1
84f148a3ed9601259f9cf856fb686a0ebcae95f5
-
SHA256
c23fa65d5d2e8e4f9ba2913e12aea4678b614c158411c488a4299eb8be6e9462
-
SHA512
2cdf0be5b2120d338c9c9feee5223d6d32aaec969c3a0ecf446783e4f37687b4adabe05d25625396a200b6e767dd80c50b19277df83cd04b9d78630d964d099a
-
SSDEEP
6144:hmfzkaAtV3d2zijKgGf2pV+EL51qpVjFBIvQsP840Y7UDs:ofzfA80K54V+OqpVjFBOQcxq
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 9 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2732-13-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2116-16-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2732-15-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2116-17-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2732-126-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1292-128-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2732-304-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2732-308-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2732-309-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2108 ABBA.tmp -
Loads dropped DLL 2 IoCs
pid Process 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\153.exe = "C:\\Program Files (x86)\\LP\\CD46\\153.exe" JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2732-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2732-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2116-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2732-15-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2116-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2732-126-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1292-128-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2732-304-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2732-308-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2732-309-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\CD46\ABBA.tmp JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe File created C:\Program Files (x86)\LP\CD46\153.exe JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe File opened for modification C:\Program Files (x86)\LP\CD46\153.exe JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ABBA.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1684 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2796 msiexec.exe Token: SeTakeOwnershipPrivilege 2796 msiexec.exe Token: SeSecurityPrivilege 2796 msiexec.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2116 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 31 PID 2732 wrote to memory of 2116 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 31 PID 2732 wrote to memory of 2116 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 31 PID 2732 wrote to memory of 2116 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 31 PID 2732 wrote to memory of 1292 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 33 PID 2732 wrote to memory of 1292 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 33 PID 2732 wrote to memory of 1292 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 33 PID 2732 wrote to memory of 1292 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 33 PID 2732 wrote to memory of 2108 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 36 PID 2732 wrote to memory of 2108 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 36 PID 2732 wrote to memory of 2108 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 36 PID 2732 wrote to memory of 2108 2732 JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe startC:\Users\Admin\AppData\Roaming\6D0EF\EDECD.exe%C:\Users\Admin\AppData\Roaming\6D0EF2⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fcd7962dac63e112a23c95f64a7a2e1.exe startC:\Program Files (x86)\EF6D2\lvvm.exe%C:\Program Files (x86)\EF6D22⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Program Files (x86)\LP\CD46\ABBA.tmp"C:\Program Files (x86)\LP\CD46\ABBA.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD539a11c1c70fd7af198e1bc9db6da309b
SHA17f2b265c3bf077c4d6cc30669173c5c9fb221c90
SHA2565479c37eac9b1cf691fe97e6e6eeb78de73f3f9fc5dfb05fe8cc77816c8b1235
SHA512c338f9078d272fe6a357d7bda37118318414e6c22ccc24551d51ce21e78cac650a414e15957d78494cc8d90e521eb253122f5a6f99de664e2be9a3828cc810d3
-
Filesize
600B
MD531811891f4a90c8e6bf427cf3ac4ac37
SHA12fdec4640e5688a7935126c8bedd35b7c24e078b
SHA2565c98289feeda6e2358d1b321fdafd0c6a2cc482b2e99831a52b242ba0cbd3966
SHA51215716fc974a90a3f612d6a4d9e85c9ed7123c2083cc0f6dc31ec06301c63e035ba0e3bcb27dd9e6217cd209b544439b5ecbb0d67fea1d2eb6143ee1c5806f099
-
Filesize
1KB
MD564b022a2858963c1fc659ec7e380854b
SHA1e336543bf383ec34d6de7dd70e53adfff0f74bcb
SHA2568d12cd9c2f363ef9808624b8f07adb982acf055aa38625fe8127a447430ed92d
SHA5129d4feb45673afe11c47189982ce4584df0c5d77e66b822a20945a8800cfb5c91eed3f4ababade3919694e67d0f4c5b3e1e57442196d2ceb0bcb95baf9e0a90c4
-
Filesize
96KB
MD5527f2c593a00e7b581780ff5d476c10b
SHA17ec63f793da8694a84dd8b79f5816eb5066c7b8c
SHA2568373bf5cfd979ce99a6639dbc0a672cfedc20415918ac9133a9cbca695725474
SHA512c0ca9e2dbdc643e33e7f35e278ef972e5486b36284b8d75925490250fc1f66e8871401e643677ae54c2fd229730d6196ab70ee975045512279f7b33f48609b02