Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 08:26

General

  • Target

    JaffaCakes118_25ad4b2d733bceb409c94f35c6b48c72.exe

  • Size

    182KB

  • MD5

    25ad4b2d733bceb409c94f35c6b48c72

  • SHA1

    1606ad922b658bf208670543b2661be3c478846e

  • SHA256

    18436fdba2f902818c3da3e6bf648860796eb08ca3e1690e44a426d69783ba9c

  • SHA512

    7dc3ff3d1051f7a5024748347d76cc832412fe2a59b85a57effc64a9eea289efe474117d44c2b2f3e22e2e78a873b1290fb27744ab75ad1616bd0ea33964b56c

  • SSDEEP

    3072:Alo0bauokAb0msostHXjcWW5z1UlHcOsGkdC1itfpkSzPXHdm7:10baugWtHzVYO8OfGd8Y

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25ad4b2d733bceb409c94f35c6b48c72.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25ad4b2d733bceb409c94f35c6b48c72.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25ad4b2d733bceb409c94f35c6b48c72.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25ad4b2d733bceb409c94f35c6b48c72.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2608
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25ad4b2d733bceb409c94f35c6b48c72.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25ad4b2d733bceb409c94f35c6b48c72.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\17DC.A5E

    Filesize

    600B

    MD5

    1229492a2ada66ab4ae31b5ebe2f5d6e

    SHA1

    4960875acc7a5ce3cbebaef7096d67c20ffa9590

    SHA256

    4aaec3551438d0ca11173b4d56ce91ecdbe6a86f9335c32b3729e7717ff834f9

    SHA512

    d7a620e761ef51eac3926a10b54de3f8e1f035c021ef91b58755cbc29955a62b9914659b310166b08048bfda1d828f92e203a65192dbe64d3a5bddc49f6542c3

  • C:\Users\Admin\AppData\Roaming\17DC.A5E

    Filesize

    1KB

    MD5

    73304fec363d87c0c3521876337487f0

    SHA1

    d0ee757ea63d5382c63ff1d6b5c9a1585560b4eb

    SHA256

    b5934902fdecd51eef1d6cd8c4f4ae3c021997e41b6de5b63e5d151020ac93bf

    SHA512

    9ac1053165aa12fb90bd67bcad18b51801edf7a2304667b5f930c4623902ebd09a41de0f5bccf6241dfaee07833fd5af564667b614af810722d85caff73f58d9

  • C:\Users\Admin\AppData\Roaming\17DC.A5E

    Filesize

    996B

    MD5

    25622a7958012687c37cf9b200b95f52

    SHA1

    f14b91b52be60052a38417af89d821e09ff8430b

    SHA256

    faf57153d7ef68d85c94e85003aafc0f17a0322286edccaadf298402d4f44d0f

    SHA512

    a0b8fa5463b994db2d5214889e26da355072ff4674062b8885145aaf8f207d6c7414f560bc7bad74a0369a493fa0631846e2faf9f28ddf282d984d7c6e89c051

  • memory/2608-12-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/4952-77-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/5032-1-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/5032-2-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/5032-13-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/5032-75-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/5032-185-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB