Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2025 22:57

General

  • Target

    JaffaCakes118_6ea2c587d5fc6ef93a25bdc187c696e5.exe

  • Size

    274KB

  • MD5

    6ea2c587d5fc6ef93a25bdc187c696e5

  • SHA1

    467750ca51adad625619772b6bbf31a51a53f900

  • SHA256

    da06994c0dd15dc44581e3387a31a9c798b357a896a15e47fbbf3917f8c69893

  • SHA512

    3a2ba077ea110333ce96546e1f06d879f0ca22e657f3161f5035cc73eb3398bf9617cb4a7f2c7f8dc4356efbb66653751b19b4cc32288c2f3314491ee5e1c81a

  • SSDEEP

    6144:LizCAjqDcl2BgBRDCwpMmsD0RW+4oPOvuVPfBqO21Mjighg:O4O2gRewpCIRW+vfhi

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ea2c587d5fc6ef93a25bdc187c696e5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ea2c587d5fc6ef93a25bdc187c696e5.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ea2c587d5fc6ef93a25bdc187c696e5.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ea2c587d5fc6ef93a25bdc187c696e5.exe startC:\Users\Admin\AppData\Roaming\89EF7\1F41D.exe%C:\Users\Admin\AppData\Roaming\89EF7
      2⤵
      • System Location Discovery: System Language Discovery
      PID:604
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ea2c587d5fc6ef93a25bdc187c696e5.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ea2c587d5fc6ef93a25bdc187c696e5.exe startC:\Program Files (x86)\F7B1B\lvvm.exe%C:\Program Files (x86)\F7B1B
      2⤵
      • System Location Discovery: System Language Discovery
      PID:336
    • C:\Program Files (x86)\LP\1DB8\19A8.tmp
      "C:\Program Files (x86)\LP\1DB8\19A8.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2284
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2532
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\89EF7\7B1B.9EF

    Filesize

    996B

    MD5

    3103f9654b475f1fe22928c520262d7f

    SHA1

    db7c3eefb5b929e273f79204d386562e321fbc12

    SHA256

    949d75baad41cf8146c018c1d0073525e77117d685a36680f4621f190e69efb9

    SHA512

    fa520937fc634bbfe05401f67a1de770cf73322b3b4f6611c2823c215a07ac42220720801d17e4538006461e6944a1f84bb5d0df26eb8fa2c7cb47c9f8ccb025

  • C:\Users\Admin\AppData\Roaming\89EF7\7B1B.9EF

    Filesize

    600B

    MD5

    1aad4a8af9540b4186daa42ff8af6efa

    SHA1

    84918e80bb33cb4a7929fd1356af5e5ce7de758f

    SHA256

    f1a2dd7b35c052889be40f4304c41aec3009e066f93b2229cb1a341208cc13da

    SHA512

    5c6720d434f9ada109c5404b9d6559304dccbaea2c72132ad91c4aec54ac25e4e7447929f403b39020c7bd566bf23d1de087c50ade7e1a3113537fdd58e9cd74

  • C:\Users\Admin\AppData\Roaming\89EF7\7B1B.9EF

    Filesize

    1KB

    MD5

    0ace02a1cc8efe8d5962cc7a2c972f44

    SHA1

    37a269062f0250f7d58463bdc737b3914075b32d

    SHA256

    d39a3ca071b476dd41ad2b8c6961b9b952ba69db7cee0fd10baee10d22d28686

    SHA512

    f45bcc653fb3253bc372e781aa863d62a08d0d84fefa6fc4de3ee6f2c72dec23072b7d3a36f358fdf1981cd78e3c9b6ce7e8b08048dc58ed53cc79355364472a

  • \Program Files (x86)\LP\1DB8\19A8.tmp

    Filesize

    97KB

    MD5

    494a3113d8759a37d39e4cc5a4b3dc2d

    SHA1

    16e693a0055dbc4c799220b522895c22730cdae0

    SHA256

    b3c6ca55cf933b8724e4923a664f5e13cd2dac07f90e9179f41ca2bcda727015

    SHA512

    b9a9a342abd3ae50095d7a405be6058fcdf140fe6893cb3a50caa20df9af4368a9ef5ea47ff1191760395e66381295922d530be7166e575c290057885e0de69b

  • memory/336-117-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/604-18-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/604-16-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2284-313-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2452-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2452-115-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2452-0-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2452-13-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2452-3-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2452-312-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2452-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2452-316-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB