Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2025, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_27d1639875727974db376290fd391d54.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_27d1639875727974db376290fd391d54.exe
-
Size
179KB
-
MD5
27d1639875727974db376290fd391d54
-
SHA1
45c0a5f21abbaa6c0dce67816fdab9bcf4fd693d
-
SHA256
1b974a29763600ad330e8afa71cc3b00fa5e1b8a94ce02b4215b841f8c74df87
-
SHA512
a5580a527a6db51bd7d47f6abd6982061f0cd894ec1b1f153343dc2adea583930c06e6f4d87e39613ebae3376ea7dae09f2b78f306356691013ef530223a22af
-
SSDEEP
3072:u20pFVLHzjIDVZ1vvtFh1AgH+dXzglLnZPIm1wu6Ufk2JDHwDm1b3HsRZ:nYdHPa5R+gH+dE7PImBk2Nam1bWZ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4224-13-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4580-15-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/4580-16-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/3468-128-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4580-328-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4580-4-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4224-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4224-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4224-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4580-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/4580-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3468-127-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3468-128-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4580-328-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_27d1639875727974db376290fd391d54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_27d1639875727974db376290fd391d54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_27d1639875727974db376290fd391d54.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4224 4580 JaffaCakes118_27d1639875727974db376290fd391d54.exe 83 PID 4580 wrote to memory of 4224 4580 JaffaCakes118_27d1639875727974db376290fd391d54.exe 83 PID 4580 wrote to memory of 4224 4580 JaffaCakes118_27d1639875727974db376290fd391d54.exe 83 PID 4580 wrote to memory of 3468 4580 JaffaCakes118_27d1639875727974db376290fd391d54.exe 91 PID 4580 wrote to memory of 3468 4580 JaffaCakes118_27d1639875727974db376290fd391d54.exe 91 PID 4580 wrote to memory of 3468 4580 JaffaCakes118_27d1639875727974db376290fd391d54.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe startC:\Program Files (x86)\LP\298A\E92.exe%C:\Program Files (x86)\LP\298A2⤵
- System Location Discovery: System Language Discovery
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27d1639875727974db376290fd391d54.exe startC:\Users\Admin\AppData\Roaming\A4056\B5429.exe%C:\Users\Admin\AppData\Roaming\A40562⤵
- System Location Discovery: System Language Discovery
PID:3468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD50fca2f01c51217b246ff93786b2409b1
SHA12a3bf9eb95df2d36f93f810734625b7cbba664ac
SHA256fcb54edce1b52b1de009ba733cd1eb23d49a1829b5ffb8a69fe7f25ec1f2aeac
SHA51266291174a0a7d2b65c19def6b9f418d4be408cea6f2c42f1cbc0b58d7d731f34ea2713106c5a733e52b951fc226bdc00e2783ad3f55dbd53c832300f94daa16f
-
Filesize
300B
MD50fb3b0416add8ad69be2bf60e07f1785
SHA18f80dc791c4e34f894948a3015ca3ab047d195b1
SHA256888b36130f49c74478c7946f61a4856410bd90ff642bf14f85979c9e3de7d7bd
SHA5126833e2e40872144d9995688eb10a7d8e51c650b679506a5502f0d0632f924f2ac8dec33b00be2587d08ef558b2cfe243b892f3b4aef90ef69957d6f15fabf05b
-
Filesize
1KB
MD5c238dd359d83a9dc0adf8747b84b30d3
SHA1433ffd904456d15f0c146f0a03f67a63c0d74dc7
SHA256603d38134297c235ba837d2203892f925e32a556fe1439bc931665a9a1ba8b2a
SHA512156bc1324ada52feeab1df9a91379385ec56ec5fe19a8f4159f5be8e80a49f38f47b5a9e23bae304eed34e21463b5e08e365cbf93aa8e13d14fe6f70713e2b41