Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07/12/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe
-
Size
180KB
-
MD5
d22ca23ee2393ca5525f25a5ada12d3e
-
SHA1
c2c994365ce4fe277575cfb0456d4c30d6425fc2
-
SHA256
f7e85d7dc28aa9eb1aa24ae4a8d2b9a024b1b1e8d1d76c82cdab0df2b330fca6
-
SHA512
976cc085c3b19ced7d62793421af09a83e1c7a5560790834284d2cd58e9c112dc6e824adca628b53de15d7f9b455c27d5fb4bff86d25ff40b180e4c729b13db9
-
SSDEEP
3072:btzuG5iiIaY7qQ1tBe5lo5/ozTCrHwKm4nVLAnrkglD7aRHJ+3:BCG5ZIaZAtGo5/g4nVLAnrHF3
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2624-18-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2140-19-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2140-80-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2556-85-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2140-198-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2140-1-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2624-18-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2624-16-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2140-19-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2140-80-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2556-85-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2556-83-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2140-198-0x0000000000400000-0x000000000046C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2624 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2624 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2624 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2624 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2556 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 33 PID 2140 wrote to memory of 2556 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 33 PID 2140 wrote to memory of 2556 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 33 PID 2140 wrote to memory of 2556 2140 d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d22ca23ee2393ca5525f25a5ada12d3e_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD573c32b562007fb013a883f54fac34acb
SHA115e2dbb0599634a527f4a830b45a3727f885939d
SHA256408bf6178701daf68edec2bf7057bdda043cb1e761658042d9b7c5e0abba86f6
SHA512a2982033b4653dd46bb93bc7900cd11a830e7e309caf967a78d7e65d546ed7ad332eb47b7b5571c894f6e9f568ac1029cca639418397dc3c0c8f2f41e0e8be12
-
Filesize
1KB
MD5e30e415d6da5a9c15be9308f2e68ebcb
SHA1078836beb50484528fad6a4aedc602f0071d8606
SHA2569902155155d1e33e9b7e5954c813a190bc1bffd09b1c1ff0c9c15d2fcac6a07f
SHA512632c3049ed3ac419f538a3120156bc9e4f615d56982b9daf3f0ae58ec5db04f515c50e0bcfc734313893dbd171949e34c589d12ecca1621b95f2407448a6f25e
-
Filesize
897B
MD5d394de6e825bd311251203fb8277eac2
SHA1d64939d797e4371478951ca5fe3a3d175cf6cb29
SHA2562d766a53fcf79ecf3d8a8e6dd4c31d404b03a92b84cf6fa119e336b77e6892fd
SHA512572ff9e2438ae570daeb3cb31ec99922993ab430485840024eace303179f485e5a713f9143506800ba787b4613aa9345d5e1b24e37491d4f70d6199ade0f0e58
-
Filesize
1KB
MD5f89eea81415a58a7d03ee0db856f5181
SHA1e191cca9497ee2b967602ae9d424a6c1d67d27db
SHA25653c2a542f618561faf8b5859324814f08bb37da09538ca116c588760101c5fbd
SHA512bb0a5e3598145b4dfcbec1afb9d45662383b8b37f2683c99319b2ecef81eb29c4e46e38276f540e13fbdbe03f25df09920cf7bcca3ba031f865f773bb9958b96
-
Filesize
597B
MD5f2411d3afcf54763e7bf2ebf2fab04de
SHA107ccdefdd1b5e7aca3191df185416dbd4adcc2bd
SHA256a9b475a4f4ab3060964e37b769151279b1242b98e065881066953dc40dd61918
SHA512c55f8ee91014bd39690633ff6b84e87c81de212511f3146abc8bd03e5c6405c15ecb544d0edc58b80a205007adc85ab1311e0d0b7cb9302ad0ab53f9456786b2