Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/12/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe
-
Size
190KB
-
MD5
e42a6b469f9e3d06fd713b5d71397e1b
-
SHA1
02a4dcda334a92c8d8352d245c4c66117fbb4e24
-
SHA256
f462384cd178f857f02a49b1020789b361a7a4f18f77f383d5b05de0b5e3830e
-
SHA512
a43f3ef2ac5212034c64ca57b8942729e76df503425d29dcd31e26932753bf01c6b6cf058fc76c6a8e7c5c606c89d1c42d5ea6b433db085198011f0e72c5da76
-
SSDEEP
3072:fuB0MNkbgivhzSKtcoe+Z8Io5JSlnZFCFVmIWQj16Wqp+EOlv:fuHSbgivh+TvIo5JSlnCz5WQRtq0EOJ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2520-14-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1868-15-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1492-86-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1868-186-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1868-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2520-13-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2520-14-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1868-15-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1492-86-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1868-186-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2520 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2520 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2520 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2520 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 30 PID 1868 wrote to memory of 1492 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 33 PID 1868 wrote to memory of 1492 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 33 PID 1868 wrote to memory of 1492 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 33 PID 1868 wrote to memory of 1492 1868 e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577d4fde455f099fb1b92ba06d7371012
SHA1d7e499af44014aee5d90c7a45f206140c44793ea
SHA2565bf3464f395b51a98e920b3b18bfd4435b1e2d02f4ba7be2fe4fdb9338132282
SHA51281bd06beb2dd57ac4504d28b54b4be9146dee7567d81a8d2fc78f5352ca34fcb53407b6f4b9015aa9f55b1c5c6d6016e0fba21ade95ac9a73019b63318506349
-
Filesize
600B
MD5cc9dfac2c50f05f453f036dee1a282b1
SHA1b19d8c3824caf67952e648668467934fe8fb1efe
SHA2567c86d9cdcaadec3dba34277109ca86e475b89e055eeab6871007b8e275b85e87
SHA512558b14374069d58c87b360abd9ea13eadc57524ea0009ba21b67e19d9312739f499e70bc2f9c0f97e7010c98792e41bcf3a38562a205d9126de299b2b4667823
-
Filesize
996B
MD5c4e9580e8b53edda8d1673ac39f5e58b
SHA17a72b38a52d5300d7e7ca995aeeb30b8b4e43b25
SHA2566139a44d9e2c3876641e9a2ece20ad2292b7c4d3900d6e090c9d943195a77d25
SHA512729162211c5d48b52bd362548bbd0f0fd8e03e6f21abc531f5cab7861cc7df83d4cc5744b9b078b5ca05653866439f171c47494842c3ebc2a10deb03e6498ca7