Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/12/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe
-
Size
158KB
-
MD5
d5c24860ba344a30d5e45fd02b6207ad
-
SHA1
48a64c133ed4c23323d060815d113347213a9ee1
-
SHA256
91be895fabca0f6b9920b743a16051cb18129e67bad60359f98127654ea97dfd
-
SHA512
f38441a54f542c097ce5ddcd54f168ac444ca81a82c03817a200679c9ae4f9874d163868b0464d2afe87e10af092fc0149010ca22ac15d8bb8f55e0a12002a32
-
SSDEEP
3072:X+E1qWnse9mYtUM6aQKQB2k0Tjng/mn7rUqG/stfGtmtdTE5hhiHQO4k:6+BwYJtNM/ir3GUt+tcCV
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2396-7-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2120-15-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2120-81-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/1928-84-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot behavioral1/memory/2120-203-0x0000000000400000-0x0000000000442000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2120-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2396-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2396-7-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2120-15-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2120-81-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1928-83-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1928-84-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2120-203-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2396 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2396 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2396 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2396 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 30 PID 2120 wrote to memory of 1928 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1928 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1928 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1928 2120 d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5be549a8c76a840e9ddc6d7e39e8e1477
SHA11f7941a9092429596b596cc12571ff608952217d
SHA256f95e088c8a68d180467cfaf9f2dc8e4561e0c727446cad493fe48d6ce861e440
SHA512118088d41b51646dd074723771862e2022ed3860cbd989d11f996eb90c5325f214df306f48318ab579da90636eecf63c28a16c9519743e46ee8fed190d1ccdfc
-
Filesize
600B
MD5c3007a275271133fdab434a6439e19ef
SHA1c02aa4515da745ff437001822de474ab0653fe75
SHA256257375b3f01b530b55f4c2a52cc83fe78f00911abb0145e059db18b31cff2c5b
SHA512da44b0fbd7209985c8d373317b16bc434d21134b0f2206b2da5d55796fbe5831fee05cba96b6026b7c4926d0bd2fa8ddbde9cda6b649f53dd40f2baa1872cd4c
-
Filesize
996B
MD53e0646a2090cb6be1ed7785f886d6b0b
SHA1341e47c624831f7a253bdb66001e56077a88a938
SHA25681bb9bf7b7caf6f7ed707043de8c7dae6ccb32cdc9e5f6b79f868f9aedab5ea0
SHA5126841a813f41f0fe7b5c2a31f5bdf9c466d5d2dd61e20dba54410e7a4f55d55a6359a175c0d6ec49b3599d27a7232d66a545ddb4ee01cdfd7220d1d0f69ff7d01