Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe
Resource
win7-20241010-en
Errors
General
-
Target
dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe
-
Size
373KB
-
MD5
dc2add2fbbd7e5f591d1382bde4b2fc5
-
SHA1
18cced85eb0764d8ec0aee5ca7e4bacc179ddfca
-
SHA256
3c518733118588fc8537354050ca65ba692aa8e71d5a0e47501e18f458a2d2c0
-
SHA512
b73f399e1d9b0d046351c6b6434885cded0c74e28daef9d6fde345aaf4c61a0f3a586ae79326e8fc8e955799b14ca322a49616e0576de0f3907445795b30d31f
-
SSDEEP
6144:2bNnomzX2lumVTz/EkFgr9prdZ1jjLjOBvqAAXFpNXzWRl9tH27MC78MJfzDd:oom43/OrrrFjLKElXFphCRlDHoYMH
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 1 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4964-55-0x0000000000400000-0x0000000000449000-memory.dmp family_cycbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 1476 ctfmon.exe 2736 2 Gansta.exe 2440 3IC.exe 4652 R2R.exe 4964 R2R.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Program Files (x86)\\Internet Explorer\\lvvm.exe" R2R.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 3IC.exe -
resource yara_rule behavioral2/files/0x0031000000023b5d-17.dat upx behavioral2/memory/2736-23-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/4964-55-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\lvvm.exe R2R.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2 Gansta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3IC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2R.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2440 3IC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1476 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 83 PID 1144 wrote to memory of 1476 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 83 PID 1144 wrote to memory of 1476 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 83 PID 1144 wrote to memory of 2736 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 84 PID 1144 wrote to memory of 2736 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 84 PID 1144 wrote to memory of 2736 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 84 PID 1144 wrote to memory of 2440 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 85 PID 1144 wrote to memory of 2440 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 85 PID 1144 wrote to memory of 2440 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 85 PID 1144 wrote to memory of 4652 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 86 PID 1144 wrote to memory of 4652 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 86 PID 1144 wrote to memory of 4652 1144 dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe 86 PID 4652 wrote to memory of 4964 4652 R2R.exe 87 PID 4652 wrote to memory of 4964 4652 R2R.exe 87 PID 4652 wrote to memory of 4964 4652 R2R.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc2add2fbbd7e5f591d1382bde4b2fc5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\ctfmon.exe"C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\ctfmon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\2 Gansta.exe"C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\2 Gansta.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\3IC.exe"C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\3IC.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\R2R.exe"C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\R2R.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\R2R.exeC:\Users\Admin\AppData\Local\Temp\nsy81E4.tmp\R2R.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming3⤵
- Executes dropped EXE
PID:4964
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bee76c79e2e63e198038e01f0d571038
SHA1fcffdd6bb030f516a46e9d303ebae2ab33af222e
SHA25650a3c7134460bfe5f2840bd8dc957edfaa76da5beaaff70f8da5e0fef80ae876
SHA512dd2e9488ad365c02722e1a2466acffb8beaf4dbb68d7093e01c50cd915418ca0642cb6bdd43f2f2b014455803f3c69dec24ca9dfee11bdf7790379181cd2f6f9
-
Filesize
219KB
MD5db592037b5526080b12b57dde54ccbc8
SHA18d5472e088c07641e26ade451d251745c7030fd8
SHA256d6b46a9ea3a5843e53e7a90d389f9e6061ebecfb197b7da6248f2876d15d6007
SHA512dd12ee9eb37d59004111ba28c47ff0470e6dbacf047f1af1af99b932ed7172be8cfa3df3f1550eda3d3448cd976395a4a8f46059a094d93be07dfebf8da00b32
-
Filesize
170KB
MD5db5499ebbfe3df8ef3f407422fab6f68
SHA19fc65b5092099782b80280e6cdaf109a89a16cfe
SHA256f7644bab8ce7f0927f045c6c0ff84cbe45eb471d071c0eada673e9af06e8d7a0
SHA512e132462dd5ac0eb36feb2bd92c004056dc164cd96546455d5202da7621436e06a811d94d8c440e71d429acce7dd8d18bcdf6c92aedc251745bda9342af7aa260
-
Filesize
3KB
MD546e07fd3a40760fda18cf6b4fc691742
SHA153ee1a754bf5e94fa88a6ab8bb6120b4011afcfa
SHA256bd7ca609d2fb63e14d08acab1091579c23e298b4fa2ac1e8d2daaff94fc107be
SHA512ce13f6527cbd13002dca00b71ab38ab12e3f3f7138ada0780ad3f40e7c49946c018a00782ec957b1fd123fb439aabc0d9b3660829dabf10ddcebba08d6e2fbbd