Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 16:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe
-
Size
288KB
-
MD5
590f828a07a7e2829ee7f121eb394b22
-
SHA1
17f5fb33294284aed8b06428a4a5f61ac88c2e24
-
SHA256
22e4f6f51dfa32787c6a98331d4d3882781d142b49d8229a001524c670fb9e85
-
SHA512
06e2b67e405664384c3a0eb8496351538122dbb3b770090f48a3c4520e71b13c9f09ee151a7c6b06c6a64d80c675a85147df7ea1ad4ac36febe955f5cfd5f6ff
-
SSDEEP
6144:a/zjYBt5WOObFBgaIkB48Om8vNCka+PTa1P5nug3e0p:x+PBgGlMvNV/PYxugLp
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2736-3-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2736-4-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/1484-16-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2736-17-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2736-171-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/756-173-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2736-300-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2736-307-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 660 40F6.tmp -
Loads dropped DLL 2 IoCs
pid Process 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\530.exe = "C:\\Program Files (x86)\\LP\\D45A\\530.exe" JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2736-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1484-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1484-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-171-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/756-173-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-300-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-307-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\D45A\530.exe JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe File created C:\Program Files (x86)\LP\D45A\530.exe JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe File opened for modification C:\Program Files (x86)\LP\D45A\40F6.tmp JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40F6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 832 msiexec.exe Token: SeTakeOwnershipPrivilege 832 msiexec.exe Token: SeSecurityPrivilege 832 msiexec.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: 33 1016 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1016 AUDIODG.EXE Token: 33 1016 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1016 AUDIODG.EXE Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe 2752 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1484 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 31 PID 2736 wrote to memory of 1484 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 31 PID 2736 wrote to memory of 1484 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 31 PID 2736 wrote to memory of 1484 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 31 PID 2736 wrote to memory of 756 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 34 PID 2736 wrote to memory of 756 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 34 PID 2736 wrote to memory of 756 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 34 PID 2736 wrote to memory of 756 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 34 PID 2736 wrote to memory of 660 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 37 PID 2736 wrote to memory of 660 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 37 PID 2736 wrote to memory of 660 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 37 PID 2736 wrote to memory of 660 2736 JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe startC:\Users\Admin\AppData\Roaming\A98E9\0B7D4.exe%C:\Users\Admin\AppData\Roaming\A98E92⤵PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_590f828a07a7e2829ee7f121eb394b22.exe startC:\Program Files (x86)\E9F80\lvvm.exe%C:\Program Files (x86)\E9F802⤵PID:756
-
-
C:\Program Files (x86)\LP\D45A\40F6.tmp"C:\Program Files (x86)\LP\D45A\40F6.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:660
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2752
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1016
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD54d27616a162342001ace63f974a2fc88
SHA13e8e3acfa44fb377e99fb6d6f6a90e4c039f4629
SHA2564143488f1724b11792dfa9d2ed157647084c82105b5a02efa4dc9a18d9c65491
SHA51285c85638a5560781844987cfafcbfa7ff32f07c4f620920631a1f75080bcdc14fba1acc62dc156220f4e8a11fa8c141db075f0dbe20e4a59282d64e78ebdb322
-
Filesize
1KB
MD54f24529a8a33b34a7e03439d285c3391
SHA126939f1c911a43beb7572ee4f29f55773e16f2ab
SHA256003f0386d7f385bb9034eaf34521c06b648d15fa1df2e06b5789278dbd94b351
SHA512facf8f726d25b3cbbb443f4a6242577024b876ff50f328f61becf59beebb06468e1527fe8078004e2bf768a4d5e246589c7d432d64414ffe719708441695aa2d
-
Filesize
600B
MD595d630079401f8365ddcc914da8e4034
SHA1e87c1ea425c119bee9915d33f2b4cb01cdc8e156
SHA2562700abb0337cb4c84c57dd19af865d5dc7d50dfeb3d86c1f5eda12d0e9ca6ab1
SHA512c8c23f0f695d310f2d6fd64b129209a96eea95ab03d61bf6f49a8db10827730e07d379c7a977f3da3659514ba3ce77026a07ab9336a95dc900e53f519227ed1e
-
Filesize
1KB
MD571e18e76a0918b01f9c72a0210815f4e
SHA1362889957e7efb5b1b92f2f2c0bbcbafaaa3dd3d
SHA2561240a5268931cba9cac021f3a28beb2157548c47ddbe029a3d93a0cf968c18e4
SHA512dbe60f4c155e98d7a5c133cf737f71c6fecb2a66998618ba1103e384347b10ad606a8dc360902d1f6662db79f1d0ce134f8880dd90523a42d0d6a2b0e27abdba
-
Filesize
101KB
MD583e33f0ea6be8e244517ba06a635c142
SHA1f3d804e1da32a45559f66c9719915bd1e690dc44
SHA256bd98d98a1754b9a118bcbdda9e03d44ec2113cf3424751cfc518fd540d305608
SHA512ba8b6114c416355bb27f3e71dc5ec5c1af24d5ec077ce08e005053602bab837e9e3b4b377f90bd0d84af2b3f85cebf316579d9fe1772ff1f5bf41aa117ca3e9e