Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe
-
Size
187KB
-
MD5
973ad6b1d0d4ed587a9daff89170b2c9
-
SHA1
407101eb9884a60779c0099064303e45d54b7afa
-
SHA256
415596545efdc9e7d8ecd2fc2db70ed8ff6ff9246ed8e8721d873beae24b37ca
-
SHA512
6e76c783a20cb8fea7c008be79fd737fce6bdd4afd6613a69f743cc32ff22bb74330068783b1eeecef30d7b00573b2d0e9ba11f7b703cc8cb05c15b3ace07a93
-
SSDEEP
3072:umpgG33H1u5F79GNgPrnw+fg+UbH8eIA6EfI73VrarwObkeLpp+RuDN4o:mwHobkCbw+fAmdzLparwWLpgSGo
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2336-7-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2280-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2792-79-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2280-80-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2280-176-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe -
resource yara_rule behavioral1/memory/2280-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2336-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2336-7-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2280-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2792-79-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2280-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2280-176-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2336 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 31 PID 2280 wrote to memory of 2336 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 31 PID 2280 wrote to memory of 2336 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 31 PID 2280 wrote to memory of 2336 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 31 PID 2280 wrote to memory of 2792 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 35 PID 2280 wrote to memory of 2792 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 35 PID 2280 wrote to memory of 2792 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 35 PID 2280 wrote to memory of 2792 2280 JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5343f6987f8592a35ed803ecd06587505
SHA19b3a5c3c08442e79c8e52dab9b4a28baaf7b865b
SHA25609c6050eb389ecae7399183c1443eb3727f419eb1edf47c793df7fcc886031c4
SHA5126a08a083f266bf8c0765c6a4e62587d66668e6829cd39a2e28a700d79994df4e107e8979f186626f86d09aa3f12817b73ddc5befe25ded66ec184f24fc84fd2e
-
Filesize
600B
MD57e6c98f5b30e38deab73c1537ac2d0f2
SHA10ead772f331b102b65eb9a2a261cfdc95020d85a
SHA256f4e6842b5b6bdd3cd3318c28a9411d13a222431d998b953bddf16171153436e4
SHA5123c740144787e49c0ad34bee6df396a7334abe9f7e5d20ae4a0042cf3fae5b093113b07c42fd85b4df2b4681001003932caed8524e14c6614b817fdc0e62a80cd
-
Filesize
996B
MD5f00f7e6b59fbd378e5c9a545d1fc6637
SHA1421fed328b69c49e37606cb3c4008577ecd7197f
SHA256f8d1e5fe8407424ab4b16a18cd66e90269c9032aeb0a471f233c3fc76a9b708c
SHA512f7e33d096820776a385f11baec1159b0166793a3c36e0f75976ff5e2d251a5f39b02f66e1afc1c09afa7cfb94abfbfdc3e90151dcdf6af8179de424154dba693