Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe
-
Size
182KB
-
MD5
e2a8c88ff29931aefcd244c8717e66ac
-
SHA1
6cc66afbb638baf72c0843e60572b0d5f2e97949
-
SHA256
b9c6548132ef29cd77a3ca881ab8fde9b19b37c604f8224b1379b220f1765176
-
SHA512
82c4f8ae58e079db6464b90c93585fb70085bcae48cd1408664987916912bad7d89e0e30e36413f8b9159db65d10feb68e8b222c61447d8476b3de71633e0437
-
SSDEEP
3072:WDMOhfDaJ5OU4AxIatRyL2kTl63DeujETrB4GluHdMlIeLA:W4uLs5ON5yRLks3Dek0B7uHClfA
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2916-7-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2612-14-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2612-78-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2336-82-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2612-83-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2612-190-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2612-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2916-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2916-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2612-14-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2612-78-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2336-80-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2336-82-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2612-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2612-190-0x0000000000400000-0x0000000000466000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2916 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2916 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2916 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2916 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2336 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 32 PID 2612 wrote to memory of 2336 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 32 PID 2612 wrote to memory of 2336 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 32 PID 2612 wrote to memory of 2336 2612 e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2a8c88ff29931aefcd244c8717e66ac_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50b93f3573bec1b0dcca4dbcca1930cd7
SHA17bab430d66fad9ba73d10466114405513726fb8d
SHA2565ba6e1a843043b7450ff67aa23117ac7abcd0bd8200a35807c58aaa7eb18f886
SHA512f142cd209db4faae645dd8dee0a42dcb5d3948a05ea20432d30632fdb9660a7276aea5cc35dfdb8d4c966eb0e4e3069f7fc589128c500f88ba66e99bba2cffbf
-
Filesize
600B
MD5ea84845577b9b1b975f5d1ca09425d98
SHA17878cf0572446ad799ffdd7493bd78055292d07c
SHA256c7a56f8647f765fbbf345c5cd84dfde1a0d9137fa2f8a00244fecf3d90df769c
SHA512b27f261919468f07f00388fb3770a23e969ae6dd4ad353787141b1f13ec66d561f52e0ff27e62c626366ca34da1dcd3f9571b95ec455ec0b54cf6ff05a4f897e
-
Filesize
996B
MD5bb58e1b6c9654c172c111b5f14666e45
SHA1dc42834bbb9bc9e84b962fe4af2c515e7c39f696
SHA2562c019ecc234721b159e8615cff483c6dc9250f170b80dbddd389142587bcf0e4
SHA512b53c0b8c605ed62078554c0071acc89cc1a9741ea0c3eb19cdc8bfe72606681c6674801663fd03d42e01abd47e4fb47b0ba0cd927824b7e86018284467a42e9c