Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/12/2024, 02:33

General

  • Target

    d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    d4d2ed9af22b504d28a3c71ba44fb931

  • SHA1

    785efcd0d606fa798b991bd9cb3cf945e7193a53

  • SHA256

    a20a0fa81c86275ebbb5aa0d465adc297391172e034ba4c3a9f73b5e34fe0922

  • SHA512

    4d9d82edf3faaf296955fc01717225223f7f10abd9c2566aba2d4e2bcf437548488086019400520ae7d697f7840237f147dd26274e44ffa2bf53176565306e55

  • SSDEEP

    3072:Y1wgtKwbbsgG6ZpBcxoOevxh2mo/uJ3bWhj6f0:Y1HQo9pZfmJuJ3q

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2784
    • C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d4d2ed9af22b504d28a3c71ba44fb931_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\8D11.A27

    Filesize

    1KB

    MD5

    750310f376a94e763272746d926d08ab

    SHA1

    0bdcda1c41b843bf28aa7dceb12e8f0f276ca6f8

    SHA256

    10f9938f22e2e40ba99ddf67a41d14ce11051048d8a122fa666bbe299a30e966

    SHA512

    33d4c11300ab8f545477c1ad59eee918fd77f73f5ac5f164d34a593d86c9a62b033139f774e3961509c5521cc047483f02fd07a83774db436755f16924c94e06

  • C:\Users\Admin\AppData\Roaming\8D11.A27

    Filesize

    600B

    MD5

    689fc798606fb7dec7908d661f0749cc

    SHA1

    3cba674c19e4166db78bb76062875fce1d34aff5

    SHA256

    626a5275c91a60f237d87908530313ed76121a8ba8b41dc5d573e7c3d44c1b1e

    SHA512

    ec9e36447683661a83d8b5b7646ab9bf1b9a40ade100b91c64260d1ac3aaf1594c3ccd7a05871da3a8aff7f49df7e344868afd87fc29babe45ae0c1ed4376dcb

  • C:\Users\Admin\AppData\Roaming\8D11.A27

    Filesize

    996B

    MD5

    d976ee97831b7ae81b628abb46d165eb

    SHA1

    2974ff0e9c446841e75ef34ef7d2b9c1e2381d30

    SHA256

    8c2938147e6b3836577ca6e5054831d30fe9cc37d8f821b16fc190eb48d27ec2

    SHA512

    c0760ccf6c426f6c317286f4b6864dcd88fb467783ae62c366fe77b2fa783e352ac32ac7058f9549e9ab97a5e8b03569782e345feaa88487852bcab544e8dabb

  • memory/2260-70-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2296-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2296-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2296-13-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2296-68-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2296-185-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2784-12-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB