Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/12/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe
-
Size
277KB
-
MD5
d479b08194dc8db6789f04845f02709d
-
SHA1
114107d5b024310ececaf09f37845737c9166cc5
-
SHA256
8735d82e35769b9a036c40059496f567c7a81134d5df8abf69881799464fd30b
-
SHA512
cdfa6e2490cb82681611f4ec04b2b33ca1a2b3bc28941680cff73a99f17ebddae4bb9310300413125dcc5a096847182fb8b8ce279046d94a751ca4d1349c8b49
-
SSDEEP
6144:4tfXPlWWZwrjVNVa4pKpo5YuKMQEWBe1t186ctjqr:4ZXJZwfVNwTuYuTkEW4
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2176-42-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2176-45-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/2928-48-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2176-104-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2064-106-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2176-219-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2176-224-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1364 C783.tmp -
Loads dropped DLL 2 IoCs
pid Process 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\533.exe = "C:\\Program Files (x86)\\LP\\A50D\\533.exe" d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2176-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2176-42-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2176-45-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2928-46-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2928-48-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2176-104-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2064-106-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2176-219-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2176-224-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\A50D\533.exe d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\A50D\533.exe d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\A50D\C783.tmp d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C783.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2960 msiexec.exe Token: SeTakeOwnershipPrivilege 2960 msiexec.exe Token: SeSecurityPrivilege 2960 msiexec.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe Token: SeShutdownPrivilege 2952 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2928 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 31 PID 2176 wrote to memory of 2928 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 31 PID 2176 wrote to memory of 2928 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 31 PID 2176 wrote to memory of 2928 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 31 PID 2176 wrote to memory of 2064 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 33 PID 2176 wrote to memory of 2064 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 33 PID 2176 wrote to memory of 2064 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 33 PID 2176 wrote to memory of 2064 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 33 PID 2176 wrote to memory of 1364 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 36 PID 2176 wrote to memory of 1364 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 36 PID 2176 wrote to memory of 1364 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 36 PID 2176 wrote to memory of 1364 2176 d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\d479b08194dc8db6789f04845f02709d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\D9414\733A5.exe%C:\Users\Admin\AppData\Roaming\D94142⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\d479b08194dc8db6789f04845f02709d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d479b08194dc8db6789f04845f02709d_JaffaCakes118.exe startC:\Program Files (x86)\1409E\lvvm.exe%C:\Program Files (x86)\1409E2⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Program Files (x86)\LP\A50D\C783.tmp"C:\Program Files (x86)\LP\A50D\C783.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1364
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5b9287b246cf43e7952469a7ed5a7ddfb
SHA17da771fc4a89f56e72a9172fe49e124d71206da6
SHA25667c451c748a005261bac429678a3102803f875220719fc8b4264912c9acb7061
SHA512203fe7babae1e4bd8219e013ec141ec1fb20bd46b34d86ff83b3eb681209e036717440d796fd2e46cfdfe187ff3bc1d07278a199623d6c3091d3c690132654f3
-
Filesize
996B
MD55c063285f0339c153430a50976a3fc71
SHA17949a54435a4c077816db66ec2fd9f6759ce7e85
SHA25698aca7cdad027e69d9be361d269a2bc1545fc7b564b4cb8ac102a0797262e4b1
SHA512c1d8673c6543942e24d2437f6733f0ca5bcacb3b0ac5c76d2140e68cccf57d5d7796067a7a9112e5f01d7b5a09a098c16ad81ab99bcf6ef1d9fb66d7aebe7833
-
Filesize
1KB
MD5ae897106ebf0c98a41c78f655caa8429
SHA100f0f96c171a879670c1c75e08dc7e7254d1a028
SHA25678e1323e12e34c198500511640496b230abe358a8f236f5108a7f5deee00a4e4
SHA512b7dd224f6f17840777efc14e34ad3a094dccbd220e77b9bba0e25e1722c1c5c5efbb82c3c781d456523baecce8b2a017740235d57fe522f29d38db9356216506
-
Filesize
600B
MD547dff79386ed159760b48ea90fb7a2ff
SHA1f8518173c42f7a2f22284a6f080f34685bdb2a4e
SHA2561c9eb4f2f7d132add3de44013377f58380f379610ea0641b5584c417857fee98
SHA51219a40e2d73cef1a2a67d360874048473cc05df84f6280bb3a7ff1a61b4451e17878b9b390310a66ed098328f15d5a316e5ed28ca83b18572bf49afdd4a759db8
-
Filesize
98KB
MD5452ca0be44887092384b55fbb84d79c7
SHA1c51135c52fdff98dacc66b1bbb5dd215b90d3a8b
SHA256fe1aa7fbb7f031ee7e5213dd6656d1502f127f6ddbd5b9aab8f6d880031ea688
SHA5129fb18a250f93fba63cf40e8efe58ef687ad197f764f1f16b23a9cbf6efc64fe60a75b523ff1c8876fa70f597f8149139410396c03db58294fce5019ea627ff07