Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe
-
Size
189KB
-
MD5
e31365389f5f5e141fb10ce51a6ffa52
-
SHA1
5e1ea0e56b37258753beb96c08b6c41600a61150
-
SHA256
862a5b766c2441711a4234ce484686232b7e2603d19acbc1ba78cba59209e18b
-
SHA512
a9dac40f4633a9d1567ef9e28f929df19c0d6aeabca99c7bb1393fd1a02c28ef38f1c249b5ba539cb2f980fe91a41cbb0092db9cad2139b651ed17804f451a83
-
SSDEEP
3072:0NajUUQ5axqHGocYFZY0a0NjFI/xJ8hlUHcHJeMxKY/:asiG6TYKN+v8MYX/
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2208-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2748-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2748-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1716-116-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2748-279-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2748-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2208-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2208-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2748-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2748-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1716-116-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2748-279-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2208 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2208 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2208 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2208 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1716 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 32 PID 2748 wrote to memory of 1716 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 32 PID 2748 wrote to memory of 1716 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 32 PID 2748 wrote to memory of 1716 2748 e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe startC:\Program Files (x86)\LP\BBA3\ADB.exe%C:\Program Files (x86)\LP\BBA32⤵PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e31365389f5f5e141fb10ce51a6ffa52_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\31BB0\222BB.exe%C:\Users\Admin\AppData\Roaming\31BB02⤵PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD546c0ef7f303fab136fa5f91ea67fb095
SHA1ec7c0793fe53ea04aa1ade63db11340a496ecc54
SHA256471a1d65dd920944fa1585708f2898c037d57ca3d3b1a738dbdcbd908b82b623
SHA5128f0efd963ad27b96a4632467dfff31dfb05d37c39b4bc3901f53a8bbd5cb429a9ebccfa15838516b4dda42f295e0659ae368c6e74a7e71368aad495a2dc07c0a
-
Filesize
600B
MD57f211e70bfeb031f2eb27abd4dba1cf0
SHA1a38c2f3b46c6f49126a37b9ac5367b3cfa18891d
SHA25640fbd3f962d51241f36ebc498fb427ff806040256718568048d3e856c2469b5f
SHA512a72124a269d6f2888a488e029c1c74007f0b4be8f089ed7cc4c0ccd042ee3726f4ab651d51b99f873fe68e01fbd5b6476f3f5147b65e21570458b6224b94b5e1
-
Filesize
1KB
MD539188a37346834549fa41c936547917a
SHA14eb130eaa5f19601361ccb641e6da61d61f61c63
SHA256809a63b5f3567ff40131583e183a027d3a84de7e668b5ad9227dc92081f99889
SHA5129bf1eb56608c82ce0409559f72013147b0a2bfaf44994fdabbfe909ead8b0c546f80554b10ef00ab725587b689edf7365eacbdc99b51297a01eec8a2123c2a4e