Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 18:13

General

  • Target

    e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe

  • Size

    182KB

  • MD5

    e2a8c88ff29931aefcd244c8717e66ac

  • SHA1

    6cc66afbb638baf72c0843e60572b0d5f2e97949

  • SHA256

    b9c6548132ef29cd77a3ca881ab8fde9b19b37c604f8224b1379b220f1765176

  • SHA512

    82c4f8ae58e079db6464b90c93585fb70085bcae48cd1408664987916912bad7d89e0e30e36413f8b9159db65d10feb68e8b222c61447d8476b3de71633e0437

  • SSDEEP

    3072:WDMOhfDaJ5OU4AxIatRyL2kTl63DeujETrB4GluHdMlIeLA:W4uLs5ON5yRLks3Dek0B7uHClfA

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2916
    • C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3A4E.CAB

    Filesize

    1KB

    MD5

    0b93f3573bec1b0dcca4dbcca1930cd7

    SHA1

    7bab430d66fad9ba73d10466114405513726fb8d

    SHA256

    5ba6e1a843043b7450ff67aa23117ac7abcd0bd8200a35807c58aaa7eb18f886

    SHA512

    f142cd209db4faae645dd8dee0a42dcb5d3948a05ea20432d30632fdb9660a7276aea5cc35dfdb8d4c966eb0e4e3069f7fc589128c500f88ba66e99bba2cffbf

  • C:\Users\Admin\AppData\Roaming\3A4E.CAB

    Filesize

    600B

    MD5

    ea84845577b9b1b975f5d1ca09425d98

    SHA1

    7878cf0572446ad799ffdd7493bd78055292d07c

    SHA256

    c7a56f8647f765fbbf345c5cd84dfde1a0d9137fa2f8a00244fecf3d90df769c

    SHA512

    b27f261919468f07f00388fb3770a23e969ae6dd4ad353787141b1f13ec66d561f52e0ff27e62c626366ca34da1dcd3f9571b95ec455ec0b54cf6ff05a4f897e

  • C:\Users\Admin\AppData\Roaming\3A4E.CAB

    Filesize

    996B

    MD5

    bb58e1b6c9654c172c111b5f14666e45

    SHA1

    dc42834bbb9bc9e84b962fe4af2c515e7c39f696

    SHA256

    2c019ecc234721b159e8615cff483c6dc9250f170b80dbddd389142587bcf0e4

    SHA512

    b53c0b8c605ed62078554c0071acc89cc1a9741ea0c3eb19cdc8bfe72606681c6674801663fd03d42e01abd47e4fb47b0ba0cd927824b7e86018284467a42e9c

  • memory/2336-82-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2336-80-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2612-83-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2612-78-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2612-14-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2612-1-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2612-2-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2612-190-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2916-7-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2916-6-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB