Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe
-
Size
170KB
-
MD5
d5eddf7321df60483dec4138d26e2118
-
SHA1
3955158ee5711e9ce9cecc5f7146ef931254018e
-
SHA256
2dbfb33c7983dabc2d94ca0018661a0ac22f3fb212e13fcdc144f6a933bc3761
-
SHA512
3739d17a9e026618c5af6e2bd6b703b9b16cf8b1ea6ebbba0210df102434984c2ac1bb990cc2ea740af9d64b39168a6a8cba790857577a3ace2a0c66b74e4c9c
-
SSDEEP
3072:D2d9X4953BCnv+nbPyx/gKeGv6QyqV9ERa9zPdolLPE0wazbIL6TR:DUI9tTbxK/v2qrV9zPOlLPE/Y
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4756-10-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/1752-15-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/1752-77-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/2216-80-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot behavioral2/memory/1752-173-0x0000000000400000-0x0000000000444000-memory.dmp family_cycbot -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1752-2-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4756-8-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4756-10-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/1752-15-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/1752-77-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/2216-79-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/2216-80-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/1752-173-0x0000000000400000-0x0000000000444000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 4756 1752 d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe 82 PID 1752 wrote to memory of 4756 1752 d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe 82 PID 1752 wrote to memory of 4756 1752 d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe 82 PID 1752 wrote to memory of 2216 1752 d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe 87 PID 1752 wrote to memory of 2216 1752 d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe 87 PID 1752 wrote to memory of 2216 1752 d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d5eddf7321df60483dec4138d26e2118_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e51cc57003e517d903ec66b46410e16b
SHA14068a3d16f5e0cdd48826b1388f3a57e94cd347b
SHA256fcf1a61e6dc5e0b1e28188be13aa991d74d2817271cdb3d248689694359a1bd1
SHA512e74dd88aa86d00dcaf3458c86bae50a05942d58a105dd8ac7bf3a7706e7bcadc3037bcc736403c27412542302066eac870e3a0dae875d698c5845f5ee7b07943
-
Filesize
600B
MD5b8fadef5af636f801a9187a56526f93c
SHA187b3146e07024005c1a7a654ee45af169a3d08ea
SHA25699199ef1ca56c6989a45f7a2b339a8fd14887bc0fbbba8b827e2dc4de8b66165
SHA51228b7d34e4324dc56a03794e068e23eca2fd263a7886bdb14bdfd642f9ef3428f6751ff5d377e10a1deb33925c1233d105cfb9029382b2e29b99293880fc7690f
-
Filesize
996B
MD56899a6e7dc723ce2662d8ddc4db4214e
SHA1f70ea73d939aa8fa18736645cd345b751631fa96
SHA2565e580518947a7366f3a0f97b6e627160423bdb586c3a424ea0565d1d1dd66bd5
SHA5125faf5f279553046fef0efa3e69ae3bf341268c89c89bbf2242c9383d4bbf5ae860163c2067dc9a10fef6e40216713dfeb1a5de958b56bc9aa9e05c1b0d614415