Analysis

  • max time kernel
    141s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 02:46

General

  • Target

    JaffaCakes118_782e3d3fa5434fbc95aec12657c7f493.exe

  • Size

    277KB

  • MD5

    782e3d3fa5434fbc95aec12657c7f493

  • SHA1

    2f193f9b807e8786cd8e024b172284a174f9d7ab

  • SHA256

    56655a085e5b4201bb77299bb7fab80c5355bce33b295db59ec29443e22ff3bc

  • SHA512

    caaf1195e5363453ae7ea53208ffc10530e744cc9735184b9af0b74e905c17e9298004da2ee3c1dd2967205eb2955420f6e0efc378b8712ebeed50bf94a92338

  • SSDEEP

    6144:buANRAZLcYjAgQiRchFGbKgn6H4XZ2JzZqV866JRu27Id6XoSOpr:VMZjxQiRXbKPH4Ie8w2sdppr

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 8 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782e3d3fa5434fbc95aec12657c7f493.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782e3d3fa5434fbc95aec12657c7f493.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782e3d3fa5434fbc95aec12657c7f493.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782e3d3fa5434fbc95aec12657c7f493.exe startC:\Users\Admin\AppData\Roaming\78205\B080A.exe%C:\Users\Admin\AppData\Roaming\78205
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1488
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782e3d3fa5434fbc95aec12657c7f493.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782e3d3fa5434fbc95aec12657c7f493.exe startC:\Program Files (x86)\058E3\lvvm.exe%C:\Program Files (x86)\058E3
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1072
    • C:\Program Files (x86)\LP\0AF7\E495.tmp
      "C:\Program Files (x86)\LP\0AF7\E495.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2512
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3060
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\78205\58E3.820

    Filesize

    696B

    MD5

    2da2dfbc13874ee62193d58e6888eca7

    SHA1

    c3107c188feac0ce536cc22930b3f1ef7ec7dbc8

    SHA256

    049662cbf82a421ffae91e113af3f661d7c1369470525129e2c36f11424f63dd

    SHA512

    f465f854d94355fb24f0e6d9d2528add7474e08b303c0d484f4bf3d012c1e8254bbcec2f8def4c79d57455303f2d933b3548ed6c880e3e5b7649daa945d17ddc

  • C:\Users\Admin\AppData\Roaming\78205\58E3.820

    Filesize

    300B

    MD5

    fcebd41e7145ba3bb3755212d8ea02e5

    SHA1

    5fec758f81f848bb893393ef07fb44c650bebc02

    SHA256

    1ea39069db6d40b8f0791487b9187b27c91758ed77769fb6b626ad3d4aeb8e65

    SHA512

    2e1821ee916a1bda122e0f77d4a64d67859acebcdde8a0748e033ae581b6f10983dc53a23b74d8ae89287ede5e5d14a176e320b79930502a39a597192f793011

  • C:\Users\Admin\AppData\Roaming\78205\58E3.820

    Filesize

    1KB

    MD5

    1bd352a6178ae19bdeb58b5cecc1f0be

    SHA1

    27cfd0bea9b686ccceb20ce500cd4e33d59a04f3

    SHA256

    88c0701688b78d871660c99e56bf96e72962b3f0fea9086a26c4c0817bfe861c

    SHA512

    e5902b5b282c7f9ad0103e38389e7cd68f658e74fa767779444beeb7b54628622f87277307cd301669764f4900cde283728abb0c1bd0ffeaa12d4575dff05b29

  • C:\Users\Admin\AppData\Roaming\78205\58E3.820

    Filesize

    1KB

    MD5

    902d372ddd890c0bb0d60c0f8addf37b

    SHA1

    2005b4dc0efc3b3da88f70f03d3b14381e098370

    SHA256

    6ff0bf079bce31a7db168380ec4e947fd85d2f884a391058172ac96849dc1c3e

    SHA512

    6e6cfbdc30fd9185b4b6e8b6cc80848295df3ecde33a76c2b41a56d93d653d78a57f505c173ec077c9207114f357443da44c2e99d70e7972a101735687d1cd95

  • \Program Files (x86)\LP\0AF7\E495.tmp

    Filesize

    97KB

    MD5

    494a3113d8759a37d39e4cc5a4b3dc2d

    SHA1

    16e693a0055dbc4c799220b522895c22730cdae0

    SHA256

    b3c6ca55cf933b8724e4923a664f5e13cd2dac07f90e9179f41ca2bcda727015

    SHA512

    b9a9a342abd3ae50095d7a405be6058fcdf140fe6893cb3a50caa20df9af4368a9ef5ea47ff1191760395e66381295922d530be7166e575c290057885e0de69b

  • memory/1072-108-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1488-13-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2512-222-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2512-223-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2804-11-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2804-0-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2804-109-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2804-10-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2804-4-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2804-3-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2804-221-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2804-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2804-281-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB