Analysis
-
max time kernel
141s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 14:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe
-
Size
172KB
-
MD5
40637b7df1b4551e5297192c17df47e5
-
SHA1
4c5e50143d566ac5e88b044b28a1a42dd7eb8df5
-
SHA256
9cd3e63886b7d682c6c3a85813c263fca2d0d47dbd94c64faef588bf649b679a
-
SHA512
ab9ef664573c03a64e80d28759aa1a008a098da93e728eb8b1fd65a8018ce6f5933041629a683540ff83f818faebbb65aa2f6bf805909959f2f2658ce68b624b
-
SSDEEP
3072:OxImS8Dv2HADLdKDmyp2SIep20o9Xq/6GJsTNu+Rp4NIghAmdbh:1YvaADLdwmG2SIep2J6/6GaTNDMhV9
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2476-15-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/1996-16-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/580-78-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/580-80-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/1996-81-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot behavioral1/memory/1996-186-0x0000000000400000-0x000000000044C000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3C2.exe = "C:\\Program Files (x86)\\Internet Explorer\\D3AD\\3C2.exe" JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe -
resource yara_rule behavioral1/memory/1996-2-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2476-13-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2476-15-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/1996-16-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/580-78-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/580-80-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/1996-81-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/1996-186-0x0000000000400000-0x000000000044C000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\D3AD\3C2.exe JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe File opened for modification C:\Program Files (x86)\Internet Explorer\D3AD\3C2.exe JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: 33 2548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2548 AUDIODG.EXE Token: 33 2548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2548 AUDIODG.EXE Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2476 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 29 PID 1996 wrote to memory of 2476 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 29 PID 1996 wrote to memory of 2476 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 29 PID 1996 wrote to memory of 2476 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 29 PID 1996 wrote to memory of 580 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 31 PID 1996 wrote to memory of 580 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 31 PID 1996 wrote to memory of 580 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 31 PID 1996 wrote to memory of 580 1996 JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe"1⤵
- Modifies security service
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe startC:\Users\Admin\AppData\Roaming\D4AE6\91ED3.exe%C:\Users\Admin\AppData\Roaming\D4AE62⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40637b7df1b4551e5297192c17df47e5.exe startC:\Program Files (x86)\E6F59\lvvm.exe%C:\Program Files (x86)\E6F592⤵
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1488
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57abf7e18ee9de384eb13eba009f4a204
SHA145bd523286337b67864623cb8f5a70c1dab59e82
SHA256f2d6854be1ad5c2a10dd06156b3bc63a6136ac48e9ac7869223edf3bd1faeb6e
SHA5123e664fbd02ccbaec19c3b26233f43db0fe02f884662711af4c3dd7bd75fd8685faaa0fbe6a86307b5de204b71fa286ac389a53c8ff54718e6fcf8b43a9dc95b9
-
Filesize
600B
MD57d8dd014415d1c5b8154fd92b057c404
SHA10c12613205a07dd5dffd9b31946da6d8e142e95e
SHA25688ed8991284969eb3f61da150c4579df02b8446d08b33cf25fb36356461d9eb7
SHA5128d39e5c2e3ced215c2b8570ef91027eb3eb4e21db04f5b560ff34cf2de3d411dc3be8759caa71553bd97f301edc32aa57afd796125902d9e103a9f161958aa11
-
Filesize
996B
MD55bf20a4d8572782b441c84bda92fc571
SHA1de3d7f7bee89dde07134915651919e0a3eefa344
SHA2564ed2fcb07937fc44b071254df0c670935c80f8bcb9e57795ff063547ce33b46d
SHA512f31c8bf50f4254dab269f6ce5f126af5ac43d32bf27474d13e707cb23b3828b4286086b041a0041852bcc1fb811f90f40e63f57cf301bf95ebfe5a5259eeae42