Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe
-
Size
188KB
-
MD5
dd1fdb5b5ee33661e34e1208ff1856cb
-
SHA1
f872d8a3f12d2723c4d07fdf86ed79f9802af858
-
SHA256
e8119f901cd0e3b92f3edbc74658bb8bcbc34e1c5206f98f8c9552b90d9e4e62
-
SHA512
580a092b4fe1786371e4a0da5cd4e7788c3987da3d7d2c256c8d892bd841f30d1e0a6180da71d139070121680c0d35e03023f949ac7b14378a6557af95cbe988
-
SSDEEP
3072:XAKEOMP7y1kVeEiA+w6LhuHVEJIX+nFtAF8rq3j+6rrL3wbBv5JnP8bqJHQvQW8q:7E/7kceEifw6LQHxuFttF6rA9v5JP8bv
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2156-8-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2996-16-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2996-76-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/3020-81-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2996-188-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2996-2-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2156-5-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2156-8-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2156-7-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2996-16-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2996-76-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/3020-79-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/3020-81-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2996-188-0x0000000000400000-0x000000000046E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2156 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2156 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2156 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2156 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 30 PID 2996 wrote to memory of 3020 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 32 PID 2996 wrote to memory of 3020 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 32 PID 2996 wrote to memory of 3020 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 32 PID 2996 wrote to memory of 3020 2996 dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dd1fdb5b5ee33661e34e1208ff1856cb_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912B
MD5dec56c8365efc727ab8129b716dc48e4
SHA18211bb163d62dfca72c99180d83b1f707aa64512
SHA25681c0fb5b61cce18f20066d03acf6574cd84ed85d5dae95c7b5e137fd417ca97b
SHA5125b2131738d400813dd537ed4de85701b326775ce15d9bee56c6191af38e3dfe186e6ee7a684f954883aba0979f268cd0d77c25b2d5023fc1b05fdfb18fdb01b6
-
Filesize
600B
MD5bf52e96830c56f38ce1b6e28942b779c
SHA1be0bd4b26bf3c3a396d146b3ac666cea2165d0be
SHA2569cb129b12a0eee1ab7460a5012de85ca2cb7947af9868276e2535eb3ec98484d
SHA512c21f5e1bcea2544ed5f0e8aadc3295c934574a3df31b287b8996c6c0ba59ad4355cc06a30245157e12474c1395ffdeff9efb132c18e2cfa529fe61240d5b2f9f