Analysis
-
max time kernel
140s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe
-
Size
281KB
-
MD5
8b125d0a76255af76c50f50aa2e038e2
-
SHA1
470f3059b16664f3d1afe98f68fb3c74bc69a2a3
-
SHA256
33c2feff987d0c0ed7539c9b13157df28c5cc7e19393852c4cfa5e3c3a81738a
-
SHA512
0f9bb6acd6ca7562b49dc8ca3564f8823e5482f326af89fb958abbc885af184e48639dee15a94b9e9ba9b3d72f720464afe3cd3cc010f9ed7bba1d342cd61817
-
SSDEEP
6144:+u6Uz378LjeuIEPg7DRGqMl0T6ok6p/tJBmHe7Zc:aI2cnRGqMyTzTJBm+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 9 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2804-3-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2804-5-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2804-6-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2956-15-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2804-16-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/1204-73-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2804-74-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2804-172-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2804-176-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2612 D308.tmp -
Loads dropped DLL 2 IoCs
pid Process 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7CC.exe = "C:\\Program Files (x86)\\LP\\0AFD\\7CC.exe" JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2804-2-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2804-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2804-5-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2804-6-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2956-15-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2804-16-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1204-73-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2804-74-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2804-172-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2804-176-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\0AFD\7CC.exe JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe File opened for modification C:\Program Files (x86)\LP\0AFD\D308.tmp JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe File opened for modification C:\Program Files (x86)\LP\0AFD\7CC.exe JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D308.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2392 explorer.exe 2572 explorer.exe 1632 explorer.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeRestorePrivilege 2496 msiexec.exe Token: SeTakeOwnershipPrivilege 2496 msiexec.exe Token: SeSecurityPrivilege 2496 msiexec.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2392 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2956 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 32 PID 2804 wrote to memory of 2956 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 32 PID 2804 wrote to memory of 2956 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 32 PID 2804 wrote to memory of 2956 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 32 PID 2804 wrote to memory of 1204 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 35 PID 2804 wrote to memory of 1204 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 35 PID 2804 wrote to memory of 1204 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 35 PID 2804 wrote to memory of 1204 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 35 PID 2804 wrote to memory of 2612 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 37 PID 2804 wrote to memory of 2612 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 37 PID 2804 wrote to memory of 2612 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 37 PID 2804 wrote to memory of 2612 2804 JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe startC:\Users\Admin\AppData\Roaming\D9F57\B080A.exe%C:\Users\Admin\AppData\Roaming\D9F572⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b125d0a76255af76c50f50aa2e038e2.exe startC:\Program Files (x86)\572BB\lvvm.exe%C:\Program Files (x86)\572BB2⤵
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Program Files (x86)\LP\0AFD\D308.tmp"C:\Program Files (x86)\LP\0AFD\D308.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2392
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2572
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5bc4366d0a577f23038c4078b9daa6529
SHA1057b8992c93e8eb027190cddf22b4953b2038418
SHA256a5b375d932be3fa254012d6a15047dbdde68744fb323cada056bf1056a36a627
SHA512e29f546c1d978e3663872c8a532ec8f4c05c06b14554f06f6403cd049d202a9c6cdc73f8955ba0e8215e5ef1dbdbf40f61d6ed6ccdfaa70f8033c18c346ca274
-
Filesize
1KB
MD585bba4ad5e949c99deb4230c43b64f96
SHA1c46784ca5b12a293f3c735131da9b1f91f0a4760
SHA256afda7e53c7fb343fd89174c050b0a7f1b0b17fbfde1fc749b78084ae2e47d79f
SHA5126b69ef4b6d2e57655ef66c414410e2c9f5989c87b77bc8e5f2a3285eae78d92fc93a216690abd59a5e55a74a94ee4e6ad7ac1ea1112a85725ca97a7273be65ca
-
Filesize
600B
MD5cf936afbdbd87a41bcaab24ce75bf673
SHA19a4dc7db82d9c375e6dbd7f5a8be6f5e27eebf94
SHA25626e40b9b0816eb69922edfb5170454db2ef93797ea1abf09b27bc0d628a37252
SHA51272b235437cf95f438f65b5e6acc5fe9db45ca2210ff069022196fb669f8fd4e4c69cbeaa2a94599f7e91306f9506d82eadbc62b3dd73a35df0ee20bd70b75785
-
Filesize
1KB
MD58960a6913ab219f516828a7c4ff36403
SHA188f28a0a6ef54396343f9cc73f1cf4712d33d430
SHA256b9d24d8a0af00b6f6483fda4c75d30517446307103c4f9569396b6f6424426a7
SHA51245497532bd779fb9f265638986fab6312a0bcc51e9498c6630150175d121b0e8be6ddf3e215c544187eb49557715517478b97f27ba108a8a124d11d267eab750