Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3JaffaCakes...8a.exe
windows7-x64
10JaffaCakes...8a.exe
windows10-2004-x64
10JaffaCakes...8a.exe
android-9-x86
JaffaCakes...8a.exe
android-10-x64
JaffaCakes...8a.exe
android-11-x64
JaffaCakes...8a.exe
macos-10.15-amd64
JaffaCakes...8a.exe
ubuntu-18.04-amd64
JaffaCakes...8a.exe
debian-9-armhf
JaffaCakes...8a.exe
debian-9-mips
JaffaCakes...8a.exe
debian-9-mipsel
Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2025, 12:41 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
Resource
debian9-mipsel-20240418-en
General
-
Target
JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe
-
Size
177KB
-
MD5
3be07720d75271452be60d7ea80d508a
-
SHA1
ce8685fbc1a0ef90eab3911b64e3cfebd60238c2
-
SHA256
2125a1e00be1bd129634cdd69d9540a4c49ae1864702547ada32ec70da42c95c
-
SHA512
375a01be852e44e3025b06f6cc58902fd12f465c028cdbe28e537218b27e00ce81fa6c038c13aae49632a1e3aea1229086dade40721f509c9f022794113af897
-
SSDEEP
3072:AWdbPR3RVFNvm8L8ds89HNnXbIygHVP3txJDnWUUXK6sAkqOjwPp1ipLitl9:XhPRH/vfL8dV9HNMygHVPrVWUUXK8kqt
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3688-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3092-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3092-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/1992-128-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3092-129-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/3092-283-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\E45B0\\73050.exe" JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe -
resource yara_rule behavioral2/memory/3092-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3688-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3688-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3092-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3092-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1992-126-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1992-128-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3092-129-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3092-283-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3092 wrote to memory of 3688 3092 JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe 82 PID 3092 wrote to memory of 3688 3092 JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe 82 PID 3092 wrote to memory of 3688 3092 JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe 82 PID 3092 wrote to memory of 1992 3092 JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe 88 PID 3092 wrote to memory of 1992 3092 JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe 88 PID 3092 wrote to memory of 1992 3092 JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be07720d75271452be60d7ea80d508a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe sh $MOZILLA/ %SIGILL% "SIGTERM|DESTROY|SIGKILL"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be07720d75271452be60d7ea80d508a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe startC:\Program Files (x86)\LP\504E\11E.exe%C:\Program Files (x86)\LP\504E2⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be07720d75271452be60d7ea80d508a.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be07720d75271452be60d7ea80d508a.exe startC:\Program Files (x86)\B00C0\lvvm.exe%C:\Program Files (x86)\B00C02⤵
- System Location Discovery: System Language Discovery
PID:1992
-
Network
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestistockanalyst.comIN AResponseistockanalyst.comIN A104.21.32.1istockanalyst.comIN A104.21.16.1istockanalyst.comIN A104.21.80.1istockanalyst.comIN A104.21.112.1istockanalyst.comIN A104.21.96.1istockanalyst.comIN A104.21.64.1istockanalyst.comIN A104.21.48.1
-
GEThttp://istockanalyst.com/12.jpg?sv=441&tq=gJ4WK%2FSUh5TBhRMw9YLJmMSTUivqg4aUxZJVK%2B%2FbxWq1SfkIYWBoJaffaCakes118_3be07720d75271452be60d7ea80d508a.exeRemote address:104.21.32.1:80RequestGET /12.jpg?sv=441&tq=gJ4WK%2FSUh5TBhRMw9YLJmMSTUivqg4aUxZJVK%2B%2FbxWq1SfkIYWBo HTTP/1.0
Connection: close
Host: istockanalyst.com
Accept: */*
User-Agent: chrome/9.0
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 167
Connection: close
Cache-Control: max-age=3600
Expires: Tue, 14 Jan 2025 13:41:44 GMT
Location: https://istockanalyst.com/12.jpg?sv=441&tq=gJ4WK%2FSUh5TBhRMw9YLJmMSTUivqg4aUxZJVK%2B%2FbxWq1SfkIYWBo
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jos1phta9CkQhgxQMgwuewqR9Dl5EpmdWmfh7VyD7i82L1ned0gE2Ib0RfT0O5KKqMcap1E9Sz5ZWoSUJ5KNYK%2FFz34qRnBUvYqepWsz7UbBkClErAAxR3I7PihQV0j5QrlG7g%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 901db3b7cee6cd95-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=26261&min_rtt=26261&rtt_var=13130&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=174&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
-
Remote address:8.8.8.8:53Request1.32.21.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestuq-x0n.hdmediastore.comIN AResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestuzl08ez-.firoli-sys.comIN AResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestqhh4h6q2h-.wwwmediahosts.comIN AResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.130.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.187.196
-
Remote address:142.250.187.196:80RequestGET / HTTP/1.0
Connection: close
Host: www.google.com
Accept: */*
ResponseHTTP/1.0 302 Found
x-hallmonitor-challenge: CgwIxbeZvAYQmO7SrwESBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-N4hlZ85AXjNSMvhbDzGO6Q' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Tue, 14 Jan 2025 12:42:45 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-WK_amUc7q-Q4Qc9ML6BK1gqXli7h2_mArYxEXj1GfL7BqSXxr2yZ4; expires=Sun, 13-Jul-2025 12:42:45 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
-
Remote address:142.250.187.196:80RequestGET / HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 302 Found
x-hallmonitor-challenge: CgwIxbeZvAYQ4JSi6AISBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-AHHlztG-PWqScLIr470gqw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Tue, 14 Jan 2025 12:42:45 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-WIQNzM6jbc_lq3tQ8Oy3y8Ok3sv8JbQ0TTushvkU24Bh5o6mPlqQ; expires=Sun, 13-Jul-2025 12:42:45 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
Connection: close
-
Remote address:8.8.8.8:53Request196.187.250.142.in-addr.arpaIN PTRResponse196.187.250.142.in-addr.arpaIN PTRlhr25s33-in-f41e100net
-
GEThttp://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGMW3mbwGIjBHmgS-z48RzK4Iu7fgy-VhXBuOEtR-eJMSiSEMC_wqqQc_EaGJKa3pNpanzOPFhw8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMJaffaCakes118_3be07720d75271452be60d7ea80d508a.exeRemote address:142.250.187.196:80RequestGET /sorry/index?continue=http://www.google.com/&q=EgS117BTGMW3mbwGIjBHmgS-z48RzK4Iu7fgy-VhXBuOEtR-eJMSiSEMC_wqqQc_EaGJKa3pNpanzOPFhw8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 429 Too Many Requests
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/html
Server: HTTP server (unknown)
Content-Length: 3075
X-XSS-Protection: 0
Connection: close
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
104.21.32.1:80http://istockanalyst.com/12.jpg?sv=441&tq=gJ4WK%2FSUh5TBhRMw9YLJmMSTUivqg4aUxZJVK%2B%2FbxWq1SfkIYWBohttpJaffaCakes118_3be07720d75271452be60d7ea80d508a.exe404 B 1.3kB 5 5
HTTP Request
GET http://istockanalyst.com/12.jpg?sv=441&tq=gJ4WK%2FSUh5TBhRMw9YLJmMSTUivqg4aUxZJVK%2B%2FbxWq1SfkIYWBoHTTP Response
301 -
-
302 B 1.5kB 5 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
307 B 1.5kB 5 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
-
-
142.250.187.196:80http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGMW3mbwGIjBHmgS-z48RzK4Iu7fgy-VhXBuOEtR-eJMSiSEMC_wqqQc_EaGJKa3pNpanzOPFhw8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMhttpJaffaCakes118_3be07720d75271452be60d7ea80d508a.exe526 B 3.7kB 6 7
HTTP Request
GET http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGMW3mbwGIjBHmgS-z48RzK4Iu7fgy-VhXBuOEtR-eJMSiSEMC_wqqQc_EaGJKa3pNpanzOPFhw8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMHTTP Response
429 -
-
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
0.159.190.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
63 B 175 B 1 1
DNS Request
istockanalyst.com
DNS Response
104.21.32.1104.21.16.1104.21.80.1104.21.112.1104.21.96.1104.21.64.1104.21.48.1
-
70 B 132 B 1 1
DNS Request
1.32.21.104.in-addr.arpa
-
168 B 3
-
69 B 142 B 1 1
DNS Request
uq-x0n.hdmediastore.com
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
69 B 142 B 1 1
DNS Request
uzl08ez-.firoli-sys.com
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
74 B 147 B 1 1
DNS Request
qhh4h6q2h-.wwwmediahosts.com
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
133.130.81.91.in-addr.arpa
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.187.196
-
74 B 112 B 1 1
DNS Request
196.187.250.142.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD57b122234e9d7a52e896fab59a8410626
SHA1e98229fc7b8042d5067a7f4a982fa1570c0c7797
SHA256066610aa814590108e0fef8295ae8cdf59caa251947350952cc7baa816f8763e
SHA512395326dc42e1bca49a7ad60a21a2b125c081a6268b6af0358dccf96ca588ad6f0c3b151b1336847bd335ba36e484ad8fe49f9ebd2dab96b1030a698d97a48770
-
Filesize
600B
MD5724710e6c5de80fd98e6f21803fb7684
SHA1aa4ac8eaeebc87ac51f9ab536f2b64639ce529b6
SHA256258c20078a9a7addd26c2e9398bcbe250e8a156a635d8a245859cad201cbdf37
SHA512122f1819673aadbc678de5872c349becc7154e4af6094cb6e87ba461b69ffac296a684026cfd35c1e3b3372ef713ba88590ee822ca32b97d67d6158c0e11956b
-
Filesize
1KB
MD59923981adf7c829dafd0f736218a0f4a
SHA124b9bafb774f049c1b53bb29473ca2aa7e09923a
SHA2566f5d1e8c7395c5cf3d24f4f53428443c0a4a0271e96e30986688ebffe8805bf0
SHA51241204d272b54a4dddd435e4ff7efcdb89bbbe97a990a4e11b882cc7042237e263c5372141e9aefc587ab9ea96859e5bfb9316633e8c517bc194cda730766d042