Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/12/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe
-
Size
168KB
-
MD5
e4e2d88e8c7740581f300995189d0393
-
SHA1
13a88b3a57190a10838aa92aae1b649443e9549b
-
SHA256
7215ca9d1a38ffa31663e43d869958a9cda47e5b4f76b1ae8e010152e5da1924
-
SHA512
ca838530a6ebe2e983bc09e1f8e66738306d2bf17124b99e8c23a660cb404d2072611350a4690caa33124d6d0a9665ad97f265d8e76357768eadbb918a8a62b9
-
SSDEEP
3072:S5Wt/iXE2F7S0nmJqPTsEof4R88yz7FzxTiiisHs2fKnqIBYaFIDe3i:SUt/uPdqJqPYEc4WD7FzEbYaFIDeS
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1788-8-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/1788-7-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2504-16-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2504-84-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/636-88-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2504-162-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2504-198-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2504-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1788-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1788-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1788-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2504-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2504-84-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/636-86-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/636-88-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2504-162-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2504-198-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1788 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 30 PID 2504 wrote to memory of 1788 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 30 PID 2504 wrote to memory of 1788 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 30 PID 2504 wrote to memory of 1788 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 30 PID 2504 wrote to memory of 636 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 32 PID 2504 wrote to memory of 636 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 32 PID 2504 wrote to memory of 636 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 32 PID 2504 wrote to memory of 636 2504 e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4e2d88e8c7740581f300995189d0393_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD552035183ebcefd1b773950efd38b31c9
SHA1a3537f6c757a3f31047d7f2c85c580d6df16e9e3
SHA256b1bb77634d019d4c4e0844784bae8a8a94a1b4c581d7217b2b39b74757e89409
SHA51233e6b2ef423791dbe4b0e1117f3171294523463df9de84d9e233890bf09ab4b40d1467a4bca716b834164fc84d7b29ee85aeaeca09ec4fbc4e2c278301eabd57
-
Filesize
1KB
MD513662b175b2a1f6a7c0587f5d445087f
SHA1e4f30099d605b06b543a9898819b3a50e0c31755
SHA256925bfae647f405a8fb2affa3b929bac01be36295f8049527b4536dc4d65f5d8a
SHA512fad9310d8e44d26092ebdc906c8a9b4c67f29986c30501cbcbb16dcefaea809be66e896ecc1f8f0eccc077d493c4dfbcc7732afb2569e980243791ddcf415e14
-
Filesize
996B
MD5eded7fc454696d1559ab9e21c2ba66b5
SHA1c7bc3bdf1cf679e4154c327bfd246c903a9bf69e
SHA2565b20a40992c5c3e3489e91dc20d824794ecc7649b981a7d3f2c6c64296c76c06
SHA5126f52f858fd265d94e706d61c1abd557e416d16a27ec3224446e75b4f1447fd32138a07698bd25531e5c1fe366fef6b3dc942919857b6d6360ac646cff7dec1bd