Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 10:33

General

  • Target

    JaffaCakes118_27d1639875727974db376290fd391d54.exe

  • Size

    179KB

  • MD5

    27d1639875727974db376290fd391d54

  • SHA1

    45c0a5f21abbaa6c0dce67816fdab9bcf4fd693d

  • SHA256

    1b974a29763600ad330e8afa71cc3b00fa5e1b8a94ce02b4215b841f8c74df87

  • SHA512

    a5580a527a6db51bd7d47f6abd6982061f0cd894ec1b1f153343dc2adea583930c06e6f4d87e39613ebae3376ea7dae09f2b78f306356691013ef530223a22af

  • SSDEEP

    3072:u20pFVLHzjIDVZ1vvtFh1AgH+dXzglLnZPIm1wu6Ufk2JDHwDm1b3HsRZ:nYdHPa5R+gH+dE7PImBk2Nam1bWZ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe startC:\Program Files (x86)\LP\298A\E92.exe%C:\Program Files (x86)\LP\298A
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4224
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe startC:\Users\Admin\AppData\Roaming\A4056\B5429.exe%C:\Users\Admin\AppData\Roaming\A4056
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\A4056\6EC2.405

    Filesize

    696B

    MD5

    0fca2f01c51217b246ff93786b2409b1

    SHA1

    2a3bf9eb95df2d36f93f810734625b7cbba664ac

    SHA256

    fcb54edce1b52b1de009ba733cd1eb23d49a1829b5ffb8a69fe7f25ec1f2aeac

    SHA512

    66291174a0a7d2b65c19def6b9f418d4be408cea6f2c42f1cbc0b58d7d731f34ea2713106c5a733e52b951fc226bdc00e2783ad3f55dbd53c832300f94daa16f

  • C:\Users\Admin\AppData\Roaming\A4056\6EC2.405

    Filesize

    300B

    MD5

    0fb3b0416add8ad69be2bf60e07f1785

    SHA1

    8f80dc791c4e34f894948a3015ca3ab047d195b1

    SHA256

    888b36130f49c74478c7946f61a4856410bd90ff642bf14f85979c9e3de7d7bd

    SHA512

    6833e2e40872144d9995688eb10a7d8e51c650b679506a5502f0d0632f924f2ac8dec33b00be2587d08ef558b2cfe243b892f3b4aef90ef69957d6f15fabf05b

  • C:\Users\Admin\AppData\Roaming\A4056\6EC2.405

    Filesize

    1KB

    MD5

    c238dd359d83a9dc0adf8747b84b30d3

    SHA1

    433ffd904456d15f0c146f0a03f67a63c0d74dc7

    SHA256

    603d38134297c235ba837d2203892f925e32a556fe1439bc931665a9a1ba8b2a

    SHA512

    156bc1324ada52feeab1df9a91379385ec56ec5fe19a8f4159f5be8e80a49f38f47b5a9e23bae304eed34e21463b5e08e365cbf93aa8e13d14fe6f70713e2b41

  • memory/3468-129-0x0000000075210000-0x0000000075249000-memory.dmp

    Filesize

    228KB

  • memory/3468-128-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/3468-127-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/3468-125-0x0000000075210000-0x0000000075249000-memory.dmp

    Filesize

    228KB

  • memory/4224-12-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4224-14-0x0000000075210000-0x0000000075249000-memory.dmp

    Filesize

    228KB

  • memory/4224-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4224-11-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4224-9-0x0000000075210000-0x0000000075249000-memory.dmp

    Filesize

    228KB

  • memory/4580-15-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/4580-16-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4580-0-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4580-4-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4580-3-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/4580-1-0x0000000075210000-0x0000000075249000-memory.dmp

    Filesize

    228KB

  • memory/4580-328-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4580-329-0x0000000075210000-0x0000000075249000-memory.dmp

    Filesize

    228KB