Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/12/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe
-
Size
164KB
-
MD5
d4d2ed9af22b504d28a3c71ba44fb931
-
SHA1
785efcd0d606fa798b991bd9cb3cf945e7193a53
-
SHA256
a20a0fa81c86275ebbb5aa0d465adc297391172e034ba4c3a9f73b5e34fe0922
-
SHA512
4d9d82edf3faaf296955fc01717225223f7f10abd9c2566aba2d4e2bcf437548488086019400520ae7d697f7840237f147dd26274e44ffa2bf53176565306e55
-
SSDEEP
3072:Y1wgtKwbbsgG6ZpBcxoOevxh2mo/uJ3bWhj6f0:Y1HQo9pZfmJuJ3q
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2784-12-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2296-13-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2296-68-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2260-70-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2296-185-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2296-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2784-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2296-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2296-68-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2260-70-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2296-185-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2784 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2784 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2784 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2784 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2260 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 32 PID 2296 wrote to memory of 2260 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 32 PID 2296 wrote to memory of 2260 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 32 PID 2296 wrote to memory of 2260 2296 d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5750310f376a94e763272746d926d08ab
SHA10bdcda1c41b843bf28aa7dceb12e8f0f276ca6f8
SHA25610f9938f22e2e40ba99ddf67a41d14ce11051048d8a122fa666bbe299a30e966
SHA51233d4c11300ab8f545477c1ad59eee918fd77f73f5ac5f164d34a593d86c9a62b033139f774e3961509c5521cc047483f02fd07a83774db436755f16924c94e06
-
Filesize
600B
MD5689fc798606fb7dec7908d661f0749cc
SHA13cba674c19e4166db78bb76062875fce1d34aff5
SHA256626a5275c91a60f237d87908530313ed76121a8ba8b41dc5d573e7c3d44c1b1e
SHA512ec9e36447683661a83d8b5b7646ab9bf1b9a40ade100b91c64260d1ac3aaf1594c3ccd7a05871da3a8aff7f49df7e344868afd87fc29babe45ae0c1ed4376dcb
-
Filesize
996B
MD5d976ee97831b7ae81b628abb46d165eb
SHA12974ff0e9c446841e75ef34ef7d2b9c1e2381d30
SHA2568c2938147e6b3836577ca6e5054831d30fe9cc37d8f821b16fc190eb48d27ec2
SHA512c0760ccf6c426f6c317286f4b6864dcd88fb467783ae62c366fe77b2fa783e352ac32ac7058f9549e9ab97a5e8b03569782e345feaa88487852bcab544e8dabb