Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe
-
Size
179KB
-
MD5
e32d431c7e28cf4392cabf071876c830
-
SHA1
5a7e765a22c1b17a367605629c0585a94f4d42c1
-
SHA256
09a79b2d84ce8c6c9ed98ae25dcbfdd8b69edaa2d07e1418a452b622399468de
-
SHA512
0068c9ba1f3ec2fa02401b2f309358a0a001a4019471f13b434a5ac04de2893c482ba911d44b6d73815f879c5d10c93ebad8f1dab94336a3f34a98f06356b382
-
SSDEEP
3072:Qvpp4K6gHfihdTAMqciIrCRSSINuE4uVmqfWVpkmvFbYdupGb3HSbtLnlr+6Z6nZ:yH46HfihdTAMsIrCvhE4uEqEvFbYdefX
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2488-7-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2488-8-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2384-16-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2384-77-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2144-81-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot behavioral1/memory/2384-192-0x0000000000400000-0x000000000046E000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2384-2-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2488-7-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2488-8-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2384-16-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2384-77-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2144-80-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2144-81-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2384-192-0x0000000000400000-0x000000000046E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2488 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2488 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2488 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2488 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2144 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2144 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2144 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2144 2384 e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e32d431c7e28cf4392cabf071876c830_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5a5845490f1359337e1dc591900f56c10
SHA182c96c33a935aa78df1536a3a96517de7bad0d1e
SHA256a19b54cc66d3649781bf2c6cfa53ca0483f5db9ed8ae22f95856cb284a670769
SHA5126f1e0af57f78d1d64e0826dbd58ebde40728b4796535a994a20d04900a5eba8451b4eee10b8a0924a153b9c71b650d90dd00b3e9ffc6aaf1c9eb641182be107d
-
Filesize
1KB
MD532719697657206c7a9d8b9e82bfc11f5
SHA10d609489d784e3696dfd93f5fc08bbbcc585f2c7
SHA25648642441539500840f89ac78bb64dc615f43703660495ac51e4e108b3413cac3
SHA512d8098ce6964925b155c739ab55dc69688dbc32dd19d1b80fb8ddc3c7cf3e95361f8c4706b71550fd4d49fbb4745a2a63832c6dd7f30abc82ec83861f64f18545