Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe
-
Size
188KB
-
MD5
d745c96c93f748979cbb107c83b14b47
-
SHA1
43600e493360d35ca36a37f25aaaa0300b800e39
-
SHA256
081b1d2bf111ffb73c006898c0d780ebf94fd0f588b6682141a2e8d008eb2436
-
SHA512
7044785b3c8331c9a5fa2d6ae80a8dec765b56d9bbb54c32103c135f779935d73b20ecd57d62a1f98ec257144cdecf551de9c0735a11f15989653b24fe406ac6
-
SSDEEP
3072:NCDtmPfvI6ZSnltQiOWChJE5megaGuTKhFKsbiQjoiDedMd/0AwX6Jgb1IP8M6L9:NPPI6ZSlwWE1zaNTK6sbiQjoXUMAwKJM
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4792-12-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/3680-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/3680-14-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/1844-134-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/3680-293-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/3680-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4792-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3680-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3680-14-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/1844-132-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1844-134-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3680-293-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4792 3680 d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe 82 PID 3680 wrote to memory of 4792 3680 d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe 82 PID 3680 wrote to memory of 4792 3680 d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe 82 PID 3680 wrote to memory of 1844 3680 d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe 88 PID 3680 wrote to memory of 1844 3680 d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe 88 PID 3680 wrote to memory of 1844 3680 d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe startC:\Program Files (x86)\LP\5286\9D9.exe%C:\Program Files (x86)\LP\52862⤵
- System Location Discovery: System Language Discovery
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d745c96c93f748979cbb107c83b14b47_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\68676\6D852.exe%C:\Users\Admin\AppData\Roaming\686762⤵
- System Location Discovery: System Language Discovery
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD513a2446475b010bb8f7f1d5d4985ef32
SHA15997b25dd97f8c8c66a477fdb6436b5d245f38a6
SHA2568376154cc65cc649d0923c30d871bb72a19f87f9f8b24655be4fe50d4a551c56
SHA5126f8c4a564206ce4c5a0349f0d0e8144eeda6cb91746e48d09c9cd7a24546bd566d04eeda27657226d5914e72f367035c282c021a428c7c53c4a10299217dc297
-
Filesize
600B
MD508ebb9cf6efb097ec5e81655bca74633
SHA165919ffeee06c6fbb293495fd296a3c633a5e610
SHA256364f6905f1175554f7c338fcaeaf86e669c32c1b99a98c0e6b245c43f597ff52
SHA512feda2ff0f7d3416fc14f361e42f7b5d94cd7b2f4567fc7db3c45f4080a09336a7b93921674fcfa2ea333b831a23a1018ceb6fdf9565229e4b412047b590cd655
-
Filesize
1KB
MD5fe6daa3be71ff2830ff6c374fdb62262
SHA1f5128a157f921e4f9544c483b212a454c9489916
SHA256fcae74151cef4250da1745f13fc5d5d947eb234df35eaacfe2709a6679912942
SHA51274f87c49995c749a17cdc3541715bc9b3d63269cef99d2d1349981697a58eb05097c1f0359ab18f92db322a62ff6cb2bc996c17614165956aac998d126f65c4d