Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 10:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe
-
Size
285KB
-
MD5
4a1680c6aa24f5dc0e4547a05503f041
-
SHA1
37b4738cb4a436fe80d821d128da5ed77fb568bd
-
SHA256
760fc7d07f405516296d896908f6b7a99c5dd62ae2e5edba3dff91f146b4599c
-
SHA512
ba971694f42612d4366665fb55c033207c2fefa61b0410d04dfa3cd848de6bc6c4a4d65727e37c5073f6abf7f07fd358de0ff14c9c6218c357888e5134b52f7e
-
SSDEEP
6144:sKuyRacZZQzliDoUh58+ZungB5eHbyPmUL0RKkom2EtFhMMYAR48HQ:sKuYbioDlz8+ZUiY+PoRKkomh2xWz
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 10 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2240-3-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2240-4-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2240-73-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1504-77-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1504-78-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2240-79-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1724-246-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2240-247-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2240-375-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2240-381-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2856 5937.tmp -
Loads dropped DLL 2 IoCs
pid Process 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\96D.exe = "C:\\Program Files (x86)\\LP\\BD1A\\96D.exe" JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2240-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2240-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2240-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2240-73-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1504-77-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1504-78-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2240-79-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1724-246-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2240-247-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2240-375-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2240-381-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\BD1A\96D.exe JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe File opened for modification C:\Program Files (x86)\LP\BD1A\5937.tmp JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe File opened for modification C:\Program Files (x86)\LP\BD1A\96D.exe JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5937.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2196 msiexec.exe Token: SeTakeOwnershipPrivilege 2196 msiexec.exe Token: SeSecurityPrivilege 2196 msiexec.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1504 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 32 PID 2240 wrote to memory of 1504 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 32 PID 2240 wrote to memory of 1504 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 32 PID 2240 wrote to memory of 1504 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 32 PID 2240 wrote to memory of 1724 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 34 PID 2240 wrote to memory of 1724 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 34 PID 2240 wrote to memory of 1724 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 34 PID 2240 wrote to memory of 1724 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 34 PID 2240 wrote to memory of 2856 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 37 PID 2240 wrote to memory of 2856 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 37 PID 2240 wrote to memory of 2856 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 37 PID 2240 wrote to memory of 2856 2240 JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe startC:\Users\Admin\AppData\Roaming\AE1DE\C0BBD.exe%C:\Users\Admin\AppData\Roaming\AE1DE2⤵PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1680c6aa24f5dc0e4547a05503f041.exe startC:\Program Files (x86)\DE415\lvvm.exe%C:\Program Files (x86)\DE4152⤵PID:1724
-
-
C:\Program Files (x86)\LP\BD1A\5937.tmp"C:\Program Files (x86)\LP\BD1A\5937.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5f127ca70919d74f009c0c45eeb15d4cf
SHA1114ebfbf01f39a445771adb7269b881fe0d8677e
SHA2562dfb3eb41104c182ebe4e347b973d2860dad73e6bbd00ebb57f877d7ab402b53
SHA512cbfa8106a21d9d6f6bd299b8dffdf4244f33a90114c5dc14ce4102f791d81fe43b0d50b79387dd8d42398276b7223626e3ad62455f292def6a3d2d8043463cc7
-
Filesize
996B
MD513629d15418233736c080ea266fbd507
SHA1f3b495abee7d9e015fa5b1db5941a3c4bdc66f8c
SHA256a30b53dd73087a86f2368feb0b7306d80dd5cda72edc8c76c54e6b979cbdb2b1
SHA51258c9c78809447c035548fd8e16b7e01445a3ae34f8403e26f1edef5a2d07c0c55d2a6db34440491e8dfe46c4036911d31d576445b0d5a2589232ef7289a5a663
-
Filesize
1KB
MD58f69980d6f07b01a791b1930e3d54dd2
SHA11f763c73cd83bfeaa097adeb4eed1c52119558bf
SHA25676b28affe2853dae9e1869108388963b66ce9f236041e63c58bdba61f4f1248b
SHA51299c4f6fc8eca0c7c8dc1dd06ea68fa7de0b816b85a1482bb90f5150ad16aea514fc12919a7f46b3675a2310fa83ca30064c3c7954c7bcb1bd6729705ffffb7ac
-
Filesize
600B
MD50bf203265589ff90fc6de44ac3b94dd6
SHA19206575940ce2c070a5667d62e97fd28df064b4e
SHA256824cff0b4d59f12adb81a2eae31f5b236974b18681bd06c516d767c2f5c05629
SHA512f3ee40e3fcdfa73cf33804f96551a4871197248615f1279149f4b3417e2b7c7de6313915ea852dea847fb4cf05079d579b88cd6647eeb58b7c7a389296987e6a
-
Filesize
100KB
MD500677af21508e80ece326e0dbf4a6f7a
SHA1017112167b456be0742001221e1963ddf92e3455
SHA2567b501b1fb142606bc7dc15e1052b184abdcaa90046f32fa5e6b195901d1fca66
SHA51234e2040b255a10e74cf36ce75c1de8535fc06e6d8fd5272b543523ac8934764054b5a2942388f27851c87fd11a17091114e790d539ca35f25f7ac9cd498bea21