Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2024, 23:15

General

  • Target

    cf86a112eca969a28b5d08a015aa5a41_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    cf86a112eca969a28b5d08a015aa5a41

  • SHA1

    2e730e35e1df222b531ad40d4235bce4222fff75

  • SHA256

    b47260f1e0e646719c8d38f0e0fdd579a6b25b9db48d7b4e6447a5edce3a7de3

  • SHA512

    9da8140a14e9c8dd264056ac31f6e8b3e174d864952be9e974ddc4c548186aba841892d30250137e4cb96fe326c46089ce7c3365429e1270147a82f5a280c77b

  • SSDEEP

    3072:yIkclVwZx7RWtScSg5rh+gn5A2RG+XdnoDB8Ya2YLuLkGU1yo/tW:uclVux7ItTg2RGcI+Ya9QUES

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf86a112eca969a28b5d08a015aa5a41_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cf86a112eca969a28b5d08a015aa5a41_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\cf86a112eca969a28b5d08a015aa5a41_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\cf86a112eca969a28b5d08a015aa5a41_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2304
    • C:\Users\Admin\AppData\Local\Temp\cf86a112eca969a28b5d08a015aa5a41_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\cf86a112eca969a28b5d08a015aa5a41_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\D0D5.E9B

    Filesize

    1KB

    MD5

    1af0d0b125c6cadf7d815e136ee24932

    SHA1

    15ddf34bc4a752f7b480234461bdcfea8ed74fef

    SHA256

    8713d6d8ed904853f1bf224bdeccf9b140c408c3832b3f845a6d856865ad355f

    SHA512

    d411688bdf831178b4ad3ae766b844c146e8564ef00ece973c9d834fa1b66bf67673cf27a179f6bcc45fa7485c6511bcfa5c64e76d3d32e2cabd45831384ed06

  • C:\Users\Admin\AppData\Roaming\D0D5.E9B

    Filesize

    600B

    MD5

    13fad5ea52587afa974d711fac513e7d

    SHA1

    867188c879138443a5923f4d230d1ba26f7963f9

    SHA256

    bc08653265f662c9b3f726f3360b90f260b3df5237fd14e759f51875c5c31017

    SHA512

    f6329bdd335166f85604d115dc45b0f23c8e041297ac6ef4b6fad2f69c855ec1cc22a389aa3f0e563ced56eb24c22156b1cc1b6a7968b8dfafe0fea269418164

  • C:\Users\Admin\AppData\Roaming\D0D5.E9B

    Filesize

    996B

    MD5

    cede00e50698e59d45182b3df8631a34

    SHA1

    730400f68465cd8683976aff3c8e39454c9a06e7

    SHA256

    12e1caf974f76025e1d985c4bccb5c829c64591c567b934377a70c8199fc4e71

    SHA512

    bda018ad493190971f1c513a739b8614c8bf828e8e8a86e16ba8f4efb3be9cb5cd27b6b1227eef213d72e5837d7e8fec11a8e5e38d3ca67b3aee75adfdce90b6

  • memory/924-75-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/924-76-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2304-6-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2304-5-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2304-8-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2380-1-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2380-2-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2380-15-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2380-143-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB