Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/12/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe
-
Size
276KB
-
MD5
d4220164d214feea2230fb9362fd5c51
-
SHA1
bdb83d442738c53ea041aea0cf88000a57d7da64
-
SHA256
4f45a703cc132aebccd38f58a387631ffb428a8d00cac8cdc723070eca7eee1d
-
SHA512
ed26ae44b1e79d707bc58a1cb2a2dff827f50811278bc3da3c17264719f7af01abe5e67e870b8286f78c7f76729d67b74c05fa334f9e71618982d76dc1dca559
-
SSDEEP
6144:B5tQHc9Q+Qi3P2G7NnkafkjPLICn8jwaRDump2DEndL5enw/Pf/G:BrG+Qi3P2ykzjIr2EnBcUnG
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2092-14-0x0000000000400000-0x00000000004A9000-memory.dmp family_cycbot behavioral1/memory/1520-15-0x0000000000400000-0x00000000004A9000-memory.dmp family_cycbot behavioral1/memory/1520-70-0x0000000000400000-0x00000000004A9000-memory.dmp family_cycbot behavioral1/memory/2092-71-0x0000000000400000-0x00000000004A9000-memory.dmp family_cycbot behavioral1/memory/2588-75-0x0000000000400000-0x00000000004A9000-memory.dmp family_cycbot behavioral1/memory/1520-172-0x0000000000400000-0x00000000004A9000-memory.dmp family_cycbot behavioral1/memory/1520-174-0x0000000000400000-0x00000000004A9000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\7BB8E\\3EED3.exe" d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe -
Pony family
-
Executes dropped EXE 1 IoCs
pid Process 2888 2B35.tmp -
Loads dropped DLL 2 IoCs
pid Process 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1520-2-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2092-12-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2092-14-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1520-15-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1520-70-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2092-71-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2588-73-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2588-75-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1520-172-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1520-174-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\D3A7\2B35.tmp d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B35.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2092 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 30 PID 1520 wrote to memory of 2092 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 30 PID 1520 wrote to memory of 2092 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 30 PID 1520 wrote to memory of 2092 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 30 PID 1520 wrote to memory of 2588 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 33 PID 1520 wrote to memory of 2588 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 33 PID 1520 wrote to memory of 2588 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 33 PID 1520 wrote to memory of 2588 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 33 PID 1520 wrote to memory of 2888 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 34 PID 1520 wrote to memory of 2888 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 34 PID 1520 wrote to memory of 2888 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 34 PID 1520 wrote to memory of 2888 1520 d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe startC:\Program Files (x86)\Common Files\D3A7\4D4.exe%C:\Program Files (x86)\Common Files\D3A72⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d4220164d214feea2230fb9362fd5c51_JaffaCakes118.exe startC:\Program Files (x86)\8E8FC\lvvm.exe%C:\Program Files (x86)\8E8FC2⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Program Files (x86)\Common Files\D3A7\2B35.tmp"C:\Program Files (x86)\Common Files\D3A7\2B35.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5afbe8597d93eb74a6d50816eb46166aa
SHA13eea168ab809f10939cbac61c59eaa7e96a7458a
SHA25643d68bcf391cf8cdc569825a6d8a781c2f7e15c411ba48c4b3af80445c795159
SHA5124130412dc103b1fc536abef9160392e557fb6179a66f282cfd0591adc341468a54b150af05416f1969a366b3cd3953de5128892d9bed5a44df0bd894e3a4c16c
-
Filesize
600B
MD58345c6d2085a56533f8279f8033ab107
SHA149a8df4f52451505405a35da5648e71f013a83cc
SHA2562b5b11d8df34ebf6984c82c8dd03290a6ba19e49bbe4dc4efa1ff3d7f3b41eb4
SHA5126be20223a8d121339ad32deb222efcdbaa97fa321198e411264556a771cd086a806304119cb3bb99c98962f2f4d1ecd8e1ba11483d7520941e85f10d140aeeb3
-
Filesize
1KB
MD5a2f432b1d4fdaa0de6b584c9a5f1ebff
SHA18edf5ca53ee73b45c7c8b3be88723cfae7f68ff0
SHA2566cef20d15a4efe733551eac703d7ec4b5fcc5daf8a6126dda28d0f77f2ff909f
SHA512ac7a911e0dc380ef1aece98c42f9df18ad5153e5879b5efe508d747aa6772011eadfc40a6304bdd5648716c0eabc63802649aa0588e31bc8834306390becb8e6
-
Filesize
996B
MD5b456a525c2cdf16719a9a05a55227d20
SHA1eddfec61adc5a984eefecafcc6eddef4ad20fc9e
SHA256c308b878b17d52b346dbd887f139cfd112f33006062aadeacb973dde83a31b10
SHA5129083b5da0cc98266876b2b20bf83824c838998bda55231d86495bbe95dae3f786ae73b3f58c6f9278a116f9e176ca21ef9a276c8c179d860cc8a7f28c876c660
-
Filesize
102KB
MD56a354b185ff0c14734556feb038cc9d2
SHA1f9c6418da513a813cf7632005b5da2f42cd45348
SHA256fc3bfa44732073344d71f91849214618ac2b9c6e6530a7fde69a8648d8d266b8
SHA512dc195008495a5169f46316c0b774c4848543f3b4704149e93f384d95e4b85eb494aafde08a3cdc09c0fee3f8b4f7a0fd7bb786534128cc727329872eff00474b