Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/12/2024, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
d5a6229468e02e5865792c268913765d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5a6229468e02e5865792c268913765d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d5a6229468e02e5865792c268913765d_JaffaCakes118.exe
-
Size
187KB
-
MD5
d5a6229468e02e5865792c268913765d
-
SHA1
daa3ca08573cdd5fba5c15fcc1f68ad45631289a
-
SHA256
5b2b1cf0f44959bbd039f3950aa7adb6ad16dd998c002ee390d9ddb7494258de
-
SHA512
9c4393de82d0ff95a935c98142688119e277183e00f3dfd68214f0e394a2436feae22afbf7f651ed878b03fb27832f77ea08fa65d088718123b372002f35b519
-
SSDEEP
3072:umpgG33H1u5F79GNgPrnw+fg+UbH8eIA6EfI73VrarwObkeLpp+RuDN4o:mwHobkCbw+fAmdzLparwWLpgSGo
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2732-6-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2668-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2984-80-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2668-81-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2668-185-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" d5a6229468e02e5865792c268913765d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2668-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2732-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2732-6-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2668-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2984-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2668-81-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2668-185-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a6229468e02e5865792c268913765d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a6229468e02e5865792c268913765d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a6229468e02e5865792c268913765d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2732 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2732 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2732 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2732 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2984 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 32 PID 2668 wrote to memory of 2984 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 32 PID 2668 wrote to memory of 2984 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 32 PID 2668 wrote to memory of 2984 2668 d5a6229468e02e5865792c268913765d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d82d4882230c4e953c3ce1e1c1823a0a
SHA19e8517762e7b0669ab4f347e6f2c2eeacbb49ef0
SHA25642b12589e43cd5118387eae25e6bbec7d900afcebdc0b09ccf693222d1ef72f9
SHA51293c0bb4a7a60decee6a691a5774d4e0530fa6aee7bfcae4a156d4ef47007cb105f1187b4dea1c4d76f915e772521f3da7eab777c348f800021ce5b2f05dd7ee6
-
Filesize
600B
MD5f6d00f326838917171cd95dabec97cc5
SHA1631f30a3abfee77f2ef1e8d6f7484c83b96acd2c
SHA2560e801439c03aaf5960a002e7daf4bccbcbdbe15606e33f54a4f902a1d0e6732f
SHA512f175a4b44e24d5798f809f926bc247d4d381eeeed2b5adb6a38ea63128cf8cbf7d4d3ee6643de11480a7063a2a21ad6a1e67749ef3a1af994eb9b5c7f2099696
-
Filesize
996B
MD57f8e8dcaba4a152dbc05f3dab3acdfc0
SHA103ab4a42029d582a7bb34bb0b1a6763a5fdf154f
SHA256af9748998352406c9b3229320235d0c8d9b192392d13634bfea5e4aae3d97d08
SHA5128863d36f826137a027b56dd2e2bc6637002c56f2e017d609a9a7636fff41bd0f2c6aa54346ee9f6a40b0373f8bcf6430ac060424854248a13c2de85c5f2ae02a