Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/12/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe
-
Size
185KB
-
MD5
e910f5392c8f57eb2e97997450f8aa1c
-
SHA1
30b65c30539bdb3d61ff927b86f95c47cf0ebf98
-
SHA256
5a2196d71fe8915087feaec9a5ecdc97160d637fcf7728c75b16accbb5ab02d0
-
SHA512
d9a386112b51d64d267865c3f5a7fc24904cfcee53d43141a7b24b020bee12a9d56d490e655ca49059a43da41779886a42caf175e99e9efd282b2de2c2ac8bbb
-
SSDEEP
3072:8h0gLgXZ9WbO58krkIRjGrt0LEZaTFcq+9Wc6WL5bqQxGZGlfTKq9FsA/Q:8hVNbO6krkIRjOKtJOqQkZGluqTsA
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2824-5-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2792-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2792-74-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/1472-78-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2792-183-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2792-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2824-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2824-6-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2792-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2792-74-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1472-76-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1472-78-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2792-183-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2824 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2824 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2824 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2824 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 30 PID 2792 wrote to memory of 1472 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 32 PID 2792 wrote to memory of 1472 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 32 PID 2792 wrote to memory of 1472 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 32 PID 2792 wrote to memory of 1472 2792 e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e910f5392c8f57eb2e97997450f8aa1c_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568047e3458ab0cde78d76f116f7bc87e
SHA15d12cca2b351ba040a9bc8e393fa2cc2ccbd8ba6
SHA2564d4f6ad340278498d5cb99408178b429dbafa433efd0bd4a61121b5fbcb43f5f
SHA512ba9068b3305b92f887c83e4fd7f0e512099ccbca2cf265a6e82623c8b9b5a4a9148824d34ec56e6dd8e411ef5ac83287356400518f704317a96edd9884539602
-
Filesize
600B
MD598c86d4f55f5b6f8a76a165548a03582
SHA1a16b8a989220368fd1c3bd7bea95b3ef37f4395a
SHA256cbb3cba79657a0f92c671fb0fc868edae3b20872c888a75cb89fae6a6489742a
SHA512d8ac091f8c82d51aaaa9224bf45b3b9d438fe60762e639931f3109afeeb8f9a8ef3401b4eed508694b2dbc8e3a2423f43d317009636532925f480017411513e1
-
Filesize
996B
MD5fe3c45656ef5fcb3bafbb194a68e3a05
SHA1927133170b960fdc4eec281a57b3da3f944212c8
SHA256ae1031e97f1a39006c24316162b2a3f583151308f2feee40fd2433c06a2dacc9
SHA5123e1c2251916ea0ae74f8eb5e8bec95478209e23847d4108223606e764c36409e739bcdb413e11732dc2887e9d85d89fc463218485e8286b1467d3dbd19f58999