Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe
-
Size
163KB
-
MD5
4f78e6907967c6f858a1d44ab0c122bd
-
SHA1
54e83b153865abae6b8210ab43843eb8f2928aee
-
SHA256
1796475e197aacc87e0a42df8a1d58340fc8f43105f4065cab277ea3502b6af5
-
SHA512
f1f43199cc776a1e0571170683ed62162a20712c7c36a28298b086a7d38871b43a9add5bc067318ad2a0284a7f2400b17012f1f5b1be9cc6fca6c4f0acb4af89
-
SSDEEP
3072:sG4dtwkbMeTx61UPk/jPU5Cycjw2fmafkex8enPAZs7MYaYECBN8OPw3q7F+sWiU:IwkEx/js5SwqmGke9AZMaKN8OwqjJaxb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2932-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2376-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2376-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2376-79-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1664-81-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/1664-83-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2376-190-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\A36F6\\1F0DC.exe" JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2376-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2932-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2932-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2376-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2376-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2376-79-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1664-81-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1664-83-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2376-190-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2932 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 30 PID 2376 wrote to memory of 2932 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 30 PID 2376 wrote to memory of 2932 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 30 PID 2376 wrote to memory of 2932 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 30 PID 2376 wrote to memory of 1664 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 33 PID 2376 wrote to memory of 1664 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 33 PID 2376 wrote to memory of 1664 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 33 PID 2376 wrote to memory of 1664 2376 JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe startC:\Program Files (x86)\LP\DCBA\BDB.exe%C:\Program Files (x86)\LP\DCBA2⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f78e6907967c6f858a1d44ab0c122bd.exe startC:\Program Files (x86)\F6DA2\lvvm.exe%C:\Program Files (x86)\F6DA22⤵
- System Location Discovery: System Language Discovery
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD598913826a69b186f98fcdb46ff3031a4
SHA17173ef7a5c320f18debeeae1c5b623593fcf6ea0
SHA256eace0b965cd84554abbf8b8bced6bb68ee71dedd40a35779f7f021f11831d859
SHA512da6cfbae48cf20f2fc6eb7ce03ee77872a7d47fb53ca963840ff7d0cf223c333310adcb94ce864d34ed2da229954778131f131e6b7844643a5be65b6625dc7f5
-
Filesize
600B
MD5fb6a22a1a708b9811dbb1b311c5f0686
SHA14e38d2e88153648698e6e5068bb798fc5f461026
SHA256d10058cf2e074ce1ad07ae0b77a4fbea117f08213c83bdee05b9854fe0fe18ee
SHA51264e54404e3f13b806f324c4ad08c487746d4891a63270e2252472a64626b2892fc8fb0e9fed0150ae0df46ba6757241757a3bfbeee2be3dc32d235803c384507
-
Filesize
996B
MD5812731b7e8d74460f1373c7873c2e2a6
SHA1412e03b997ccdbc96a14cffeee3d4095fa84573d
SHA256718f7ea1aea0c52b24daae14f0fbacd52d8ef3ab0734a0e3269e60815bc4ef6f
SHA512f30662c86d8a73931b347e72d7f55061a762978311c06dded51cc8880c99f1e5120b77aa835f490824944303406a201bf4b079777f09c32b12ac7c82bfaf122f