Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/12/2024, 06:18

General

  • Target

    d5a6229468e02e5865792c268913765d_JaffaCakes118.exe

  • Size

    187KB

  • MD5

    d5a6229468e02e5865792c268913765d

  • SHA1

    daa3ca08573cdd5fba5c15fcc1f68ad45631289a

  • SHA256

    5b2b1cf0f44959bbd039f3950aa7adb6ad16dd998c002ee390d9ddb7494258de

  • SHA512

    9c4393de82d0ff95a935c98142688119e277183e00f3dfd68214f0e394a2436feae22afbf7f651ed878b03fb27832f77ea08fa65d088718123b372002f35b519

  • SSDEEP

    3072:umpgG33H1u5F79GNgPrnw+fg+UbH8eIA6EfI73VrarwObkeLpp+RuDN4o:mwHobkCbw+fAmdzLparwWLpgSGo

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2732
    • C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d5a6229468e02e5865792c268913765d_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4AA8.3D3

    Filesize

    1KB

    MD5

    d82d4882230c4e953c3ce1e1c1823a0a

    SHA1

    9e8517762e7b0669ab4f347e6f2c2eeacbb49ef0

    SHA256

    42b12589e43cd5118387eae25e6bbec7d900afcebdc0b09ccf693222d1ef72f9

    SHA512

    93c0bb4a7a60decee6a691a5774d4e0530fa6aee7bfcae4a156d4ef47007cb105f1187b4dea1c4d76f915e772521f3da7eab777c348f800021ce5b2f05dd7ee6

  • C:\Users\Admin\AppData\Roaming\4AA8.3D3

    Filesize

    600B

    MD5

    f6d00f326838917171cd95dabec97cc5

    SHA1

    631f30a3abfee77f2ef1e8d6f7484c83b96acd2c

    SHA256

    0e801439c03aaf5960a002e7daf4bccbcbdbe15606e33f54a4f902a1d0e6732f

    SHA512

    f175a4b44e24d5798f809f926bc247d4d381eeeed2b5adb6a38ea63128cf8cbf7d4d3ee6643de11480a7063a2a21ad6a1e67749ef3a1af994eb9b5c7f2099696

  • C:\Users\Admin\AppData\Roaming\4AA8.3D3

    Filesize

    996B

    MD5

    7f8e8dcaba4a152dbc05f3dab3acdfc0

    SHA1

    03ab4a42029d582a7bb34bb0b1a6763a5fdf154f

    SHA256

    af9748998352406c9b3229320235d0c8d9b192392d13634bfea5e4aae3d97d08

    SHA512

    8863d36f826137a027b56dd2e2bc6637002c56f2e017d609a9a7636fff41bd0f2c6aa54346ee9f6a40b0373f8bcf6430ac060424854248a13c2de85c5f2ae02a

  • memory/2668-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2668-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2668-14-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2668-81-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2668-185-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2732-5-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2732-6-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2984-80-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB