Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 18:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe
-
Size
164KB
-
MD5
e2b6b4ba492e29d1f371cd7ee6009481
-
SHA1
bd9a29a0373119f5b57b5cd0036f189031d74d05
-
SHA256
b1c009523e7737a3943d0e8cf838315d65a27e3e6bcf5cb4a475a48c9396d89e
-
SHA512
248a60a27646802e179e9d384dbdf87d144f31e80a52b5f392608f47faf0826807ea559f9e586c312461fb4c388009d7d6f89a5414159b44960efbcb5d518504
-
SSDEEP
3072:4E1OQ5robrIkju3n6LrL0p/doKH6NHeNcfEForE8EDFjmyNds+Bgy:4kncLju36LrLc/7hNhoADhmyNdVBgy
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2224-6-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/3060-14-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2356-81-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/3060-184-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3060-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2224-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2224-5-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3060-14-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2356-81-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3060-184-0x0000000000400000-0x0000000000468000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2224 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2224 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2224 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2224 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2356 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 33 PID 3060 wrote to memory of 2356 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 33 PID 3060 wrote to memory of 2356 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 33 PID 3060 wrote to memory of 2356 3060 e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2356
-
Network
-
Remote address:8.8.8.8:53Requestgreenherbalteaonline.comIN AResponse
-
Remote address:8.8.8.8:53Requestgreenherbalteaonline.comIN A
-
Remote address:8.8.8.8:53Requestextremerollerclub.comIN AResponse
-
Remote address:8.8.8.8:53Requestzonetf.comIN AResponsezonetf.comIN A13.248.169.48zonetf.comIN A76.223.54.146
-
Remote address:8.8.8.8:53Requestzonetf.comIN AResponsezonetf.comIN A76.223.54.146zonetf.comIN A13.248.169.48
-
Remote address:8.8.8.8:53Requestsearchmobilecode.comIN AResponse
-
POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8yjYvEaS%2FT%2BsqtSr%2Fe%2BV5ZuRg%3D%3De2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exeRemote address:13.248.169.48:80RequestPOST /index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8yjYvEaS%2FT%2BsqtSr%2Fe%2BV5ZuRg%3D%3D HTTP/1.1
Host: zonetf.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Content-Length: 0
Connection: close
ResponseHTTP/1.1 405 Method Not Allowed
connection: close
-
POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqpSr%2Fe%2BV5ZuRg%3D%3De2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exeRemote address:76.223.54.146:80RequestPOST /index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqpSr%2Fe%2BV5ZuRg%3D%3D HTTP/1.1
Host: zonetf.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Content-Length: 0
Connection: close
ResponseHTTP/1.1 405 Method Not Allowed
connection: close
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A172.217.20.164
-
Remote address:172.217.20.164:80RequestGET / HTTP/1.0
Connection: close
Host: www.google.com
Accept: */*
ResponseHTTP/1.0 302 Found
x-hallmonitor-challenge: CgwI24HrugYQ3_zyoAMSBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-mZk_0uqWHSYBu4gRKwZUFQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 12 Dec 2024 10:54:19 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-WXtPVpLQWTVnaVdAS7IVKTKqUXDSrVA4n9vIeGYjrm3rw9n9G6aQ; expires=Tue, 10-Jun-2025 10:54:19 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
-
Remote address:8.8.8.8:53Requestpdadatarestore.comIN AResponse
-
Remote address:172.217.20.164:80RequestGET / HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 302 Found
x-hallmonitor-challenge: CgwI3IHrugYQnMO9sAESBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-r1eggk7zimiulLfbFClwgQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 12 Dec 2024 10:54:20 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-Us13GASydt1GTBZRgTj4dBbZaERLQl6VbarbO54VtoheIGzgUZbA; expires=Tue, 10-Jun-2025 10:54:20 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
Connection: close
-
GEThttp://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGNyB67oGIjCz0zT_iPiaY1ZaUoeHkIHXSAF-zgsJgh9Iu3Td_M9ZyrtfbbAST2hErkb-h8W2tTsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMe2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exeRemote address:172.217.20.164:80RequestGET /sorry/index?continue=http://www.google.com/&q=EgS117BTGNyB67oGIjCz0zT_iPiaY1ZaUoeHkIHXSAF-zgsJgh9Iu3Td_M9ZyrtfbbAST2hErkb-h8W2tTsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 429 Too Many Requests
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/html
Server: HTTP server (unknown)
Content-Length: 3075
X-XSS-Protection: 0
Connection: close
-
13.248.169.48:80http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8yjYvEaS%2FT%2BsqtSr%2Fe%2BV5ZuRg%3D%3Dhttpe2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe585 B 245 B 5 4
HTTP Request
POST http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8yjYvEaS%2FT%2BsqtSr%2Fe%2BV5ZuRg%3D%3DHTTP Response
405 -
76.223.54.146:80http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqpSr%2Fe%2BV5ZuRg%3D%3Dhttpe2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe583 B 245 B 5 4
HTTP Request
POST http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gBk7l%2FnN2QTzGT7iisypAfMYP5f%2F0alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqpSr%2Fe%2BV5ZuRg%3D%3DHTTP Response
405 -
466 B 1.5kB 7 6
HTTP Request
GET http://www.google.com/HTTP Response
302 -
-
307 B 1.5kB 5 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
172.217.20.164:80http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGNyB67oGIjCz0zT_iPiaY1ZaUoeHkIHXSAF-zgsJgh9Iu3Td_M9ZyrtfbbAST2hErkb-h8W2tTsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMhttpe2b6b4ba492e29d1f371cd7ee6009481_JaffaCakes118.exe618 B 3.7kB 8 7
HTTP Request
GET http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGNyB67oGIjCz0zT_iPiaY1ZaUoeHkIHXSAF-zgsJgh9Iu3Td_M9ZyrtfbbAST2hErkb-h8W2tTsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMHTTP Response
429 -
-
140 B 143 B 2 1
DNS Request
greenherbalteaonline.com
DNS Request
greenherbalteaonline.com
-
67 B 140 B 1 1
DNS Request
extremerollerclub.com
-
56 B 88 B 1 1
DNS Request
zonetf.com
DNS Response
13.248.169.4876.223.54.146
-
56 B 88 B 1 1
DNS Request
zonetf.com
DNS Response
76.223.54.14613.248.169.48
-
66 B 139 B 1 1
DNS Request
searchmobilecode.com
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
172.217.20.164
-
64 B 137 B 1 1
DNS Request
pdadatarestore.com
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ca03956ac09d4a5663ba9996cd38d133
SHA1ac744cd92f44250d351817adc896d24bbff02f33
SHA256a798fa286353a107f0bb04b1c4c4424e1794583c09d70f6517523ff525eec24f
SHA512317266b488a81f505f58d542419f253af1c8ce83be031a956a2c5c5aab6e676bd3f39e118f9b88628330831bed9a1d068f83919c9d5d4beff5990c619c89f29c
-
Filesize
600B
MD54485dc8bc3d5b0e7a10218523fff4142
SHA1aefb254f611240d9f5b1b80b195357fc850618e1
SHA25601c8cfd89f9659f86c6aa5c85448c0ce9ce86529b71774be86fda9dd448654da
SHA512d6fa216cfcfc47ec634bebba812dcb5fcf23b79e0205520a385d8035e82cd6d33739e2a4a4d10a08e1087092cd1e351b8a0be95240c4f4a046a6c52c02b53fde
-
Filesize
996B
MD56321cab05a0b23cc86feae42bdb70ce2
SHA19824f7c545869500d001499493e5396abc0f6135
SHA2564d91c4cdb8f4b2b1e10882ccd1950ec5a4fdca22a27ddd21419c966982f0109a
SHA512b087d4f1b2ec96e088dba9bb25d69b08b10f11eedbe3519b9f0323119c075552686f81f5fe8424f0071fb4ad3b413834355e9543e4d682f9b191ca5b0336a60e