Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe
-
Size
174KB
-
MD5
dff3fb883bd41d208d344a1534c10972
-
SHA1
92fd3eeb533a414a83cef63fda56bc52c5ca1f48
-
SHA256
8a251398871531f740093271c792314bb8d9faaac016bc452b0fb49ba59a9a4b
-
SHA512
5b3bbc757266bcf57bc9bdc6e5cb502e47f059cfa1a5f58429a976b8d5151e56a1521c22c013f3f7d726b206df3583fb58e31bce7df84973656d1527bb1463b0
-
SSDEEP
3072:c65j3F+CNfYzPvvZ88gCH+S5/946iRBbs7qe756xNcvCupCkkYbJKog6NSLkVF1H:c+2zvZ8z43wRBbsGky7zsVF1IL+tWB
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2884-14-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2764-15-0x0000000000400000-0x000000000044F000-memory.dmp family_cycbot behavioral1/memory/2764-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/688-85-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2764-86-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2764-186-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2764-189-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ADB.exe = "C:\\Program Files (x86)\\LP\\BBAB\\ADB.exe" dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2764-2-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2884-13-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2884-14-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2764-15-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2764-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/688-85-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2764-86-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2764-186-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2764-189-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\BBAB\ADB.exe dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe File created C:\Program Files (x86)\LP\BBAB\ADB.exe dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\BBAB\BA0C.tmp dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2832 msiexec.exe Token: SeTakeOwnershipPrivilege 2832 msiexec.exe Token: SeSecurityPrivilege 2832 msiexec.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2884 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2884 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2884 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2884 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 31 PID 2764 wrote to memory of 688 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 33 PID 2764 wrote to memory of 688 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 33 PID 2764 wrote to memory of 688 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 33 PID 2764 wrote to memory of 688 2764 dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe"1⤵
- Modifies security service
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\BCDE9\222BB.exe%C:\Users\Admin\AppData\Roaming\BCDE92⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dff3fb883bd41d208d344a1534c10972_JaffaCakes118.exe startC:\Program Files (x86)\E9658\lvvm.exe%C:\Program Files (x86)\E96582⤵
- System Location Discovery: System Language Discovery
PID:688
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59834ec2ce1ca9931e0f4ddaa455226e1
SHA1ded44c89acc7489c45fa6436147e0268ad414356
SHA256864df480619d726e99eddd4d54fb3004d75590f3ed65022a5251bb17cd5e9114
SHA5125dae3a6356a097e12607dc8fdfcf2d224274ef4e7e21af322e5862fe8e98c55dc102604be3a6f0c830a224a8995e98acb76e2f644f3fff7e73ec346078efac2c
-
Filesize
600B
MD512fba7bde053ac4596d70fb2883d3a09
SHA152695240d80a2d1149b56885166fe7e2233e7e91
SHA256307d44e0333420bafd1d0573223cb000727575f2f580efe66f91ff84e8748f38
SHA5128eb0ad35a07327d45a3ae037269f8cc1eec22c0add45ce795e8970615f25d395194cf30b1cf1e52f5a2d654f5729295faf9eb8ae9ee9f051fca10f86bcadac2b
-
Filesize
996B
MD5222b1ea02993d3c31a006b50d3ada73f
SHA18a574368dfb66369f0976a504ea166c099d02e9d
SHA256e81b125305def90884860362e3717f45082987d403a83cfbeae573c1d603b466
SHA512f14249ca154a3830619886d9704dcc9e64942bf0dbd46f1d4dfb5398e2c5e67ab3cdfd4f4a5a1f3dbe57f6a99b37a15de4ddaea0a0d279c79bc29a2292835411