Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/12/2024, 06:48

General

  • Target

    d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe

  • Size

    158KB

  • MD5

    d5c24860ba344a30d5e45fd02b6207ad

  • SHA1

    48a64c133ed4c23323d060815d113347213a9ee1

  • SHA256

    91be895fabca0f6b9920b743a16051cb18129e67bad60359f98127654ea97dfd

  • SHA512

    f38441a54f542c097ce5ddcd54f168ac444ca81a82c03817a200679c9ae4f9874d163868b0464d2afe87e10af092fc0149010ca22ac15d8bb8f55e0a12002a32

  • SSDEEP

    3072:X+E1qWnse9mYtUM6aQKQB2k0Tjng/mn7rUqG/stfGtmtdTE5hhiHQO4k:6+BwYJtNM/ir3GUt+tcCV

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2396
    • C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d5c24860ba344a30d5e45fd02b6207ad_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\EC48.5E3

    Filesize

    1KB

    MD5

    be549a8c76a840e9ddc6d7e39e8e1477

    SHA1

    1f7941a9092429596b596cc12571ff608952217d

    SHA256

    f95e088c8a68d180467cfaf9f2dc8e4561e0c727446cad493fe48d6ce861e440

    SHA512

    118088d41b51646dd074723771862e2022ed3860cbd989d11f996eb90c5325f214df306f48318ab579da90636eecf63c28a16c9519743e46ee8fed190d1ccdfc

  • C:\Users\Admin\AppData\Roaming\EC48.5E3

    Filesize

    600B

    MD5

    c3007a275271133fdab434a6439e19ef

    SHA1

    c02aa4515da745ff437001822de474ab0653fe75

    SHA256

    257375b3f01b530b55f4c2a52cc83fe78f00911abb0145e059db18b31cff2c5b

    SHA512

    da44b0fbd7209985c8d373317b16bc434d21134b0f2206b2da5d55796fbe5831fee05cba96b6026b7c4926d0bd2fa8ddbde9cda6b649f53dd40f2baa1872cd4c

  • C:\Users\Admin\AppData\Roaming\EC48.5E3

    Filesize

    996B

    MD5

    3e0646a2090cb6be1ed7785f886d6b0b

    SHA1

    341e47c624831f7a253bdb66001e56077a88a938

    SHA256

    81bb9bf7b7caf6f7ed707043de8c7dae6ccb32cdc9e5f6b79f868f9aedab5ea0

    SHA512

    6841a813f41f0fe7b5c2a31f5bdf9c466d5d2dd61e20dba54410e7a4f55d55a6359a175c0d6ec49b3599d27a7232d66a545ddb4ee01cdfd7220d1d0f69ff7d01

  • memory/1928-84-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1928-83-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2120-15-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2120-81-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2120-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2120-2-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2120-203-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2396-7-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2396-6-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2396-5-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB