Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2025, 03:38 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe
-
Size
177KB
-
MD5
69ceb7f4c6e602400dc93637ae94a4b1
-
SHA1
333c45c68307eff607cd802d6558775b0f9845a8
-
SHA256
1b9973292a4f821f661853620f588e74c12c7b0f5d5e2cc98dd9c4051762a874
-
SHA512
3cbab37b9531b036b800e206b518497603db392d807c11c434d8222e2daf7c156c14ca1212e9b45f3a50a367ed961ee3de6f59e3cc00da03c812cc97a4dfd594
-
SSDEEP
3072:o3RXLWmMt9ZeJJCErPUezCBjUZWiRzH2+zvt5iqVIENYhsZYbTaCewNZhumXqaHX:8dWHHaJrs8CBj+WiR2+Lv5VVNQsZYb8E
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4168-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/1776-125-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-126-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2596-304-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\DF414\\77105.exe" JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe -
resource yara_rule behavioral2/memory/2596-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4168-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4168-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1776-125-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-126-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2596-304-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4168 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 82 PID 2596 wrote to memory of 4168 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 82 PID 2596 wrote to memory of 4168 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 82 PID 2596 wrote to memory of 1776 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 87 PID 2596 wrote to memory of 1776 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 87 PID 2596 wrote to memory of 1776 2596 JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe startC:\Program Files (x86)\LP\059D\000.exe%C:\Program Files (x86)\LP\059D2⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe startC:\Program Files (x86)\1409D\lvvm.exe%C:\Program Files (x86)\1409D2⤵
- System Location Discovery: System Language Discovery
PID:1776
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request138.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request138.32.126.40.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request7.98.22.2.in-addr.arpaIN PTRResponse7.98.22.2.in-addr.arpaIN PTRa2-22-98-7deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request7.98.22.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestjointhenewworldorder.comIN AResponsejointhenewworldorder.comIN A13.248.169.48jointhenewworldorder.comIN A76.223.54.146
-
GEThttp://jointhenewworldorder.com/images/pages.jpg?sv=419&tq=gJ4WK%2FSUh6zGkUR8oY%2BQrMWTUj26kJHjyZJTOrqVyaBqtUn5CGFYVw%3D%3DJaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exeRemote address:13.248.169.48:80RequestGET /images/pages.jpg?sv=419&tq=gJ4WK%2FSUh6zGkUR8oY%2BQrMWTUj26kJHjyZJTOrqVyaBqtUn5CGFYVw%3D%3D HTTP/1.0
Connection: close
Host: jointhenewworldorder.com
Accept: */*
User-Agent: chrome/9.0
ResponseHTTP/1.0 200 OK
date: Thu, 16 Jan 2025 03:39:04 GMT
content-length: 189
-
Remote address:8.8.8.8:53Request48.169.248.13.in-addr.arpaIN PTRResponse48.169.248.13.in-addr.arpaIN PTRa904c694c05102f30awsglobalacceleratorcom
-
Remote address:8.8.8.8:53Request-pki5isa.wwwmediahosts.comIN AResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request87ktghw.hdmediastore.comIN AResponse
-
Remote address:8.8.8.8:53Request53.210.109.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request53.210.109.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8fivp-6j7b.firoli-sys.comIN AResponse
-
Remote address:8.8.8.8:53Request167.190.18.2.in-addr.arpaIN PTRResponse167.190.18.2.in-addr.arpaIN PTRa2-18-190-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.187.196
-
Remote address:142.250.187.196:80RequestGET / HTTP/1.0
Connection: close
Host: www.google.com
Accept: */*
ResponseHTTP/1.0 302 Found
x-hallmonitor-challenge: CgwIlP-hvAYQiLS-1AESBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-2nGxn_e3kdMMIr5QTWtD7g' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 16 Jan 2025 03:40:04 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-XJ2ZPQaLKn9epDhos3iR9uxyk-W3U73rA_m350miBRRNnxZuimxNw; expires=Tue, 15-Jul-2025 03:40:04 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
-
Remote address:142.250.187.196:80RequestGET / HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 302 Found
x-hallmonitor-challenge: CgwIlP-hvAYQyuGjnAMSBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-0blHTLoYpV9uSMzq6nPeoQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 16 Jan 2025 03:40:04 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-WIb_LoWlofjSo8Xod0knqwjAi6xKlFb-EbmMt3w8BZ_i1E3a4iqE8; expires=Tue, 15-Jul-2025 03:40:04 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
Connection: close
-
Remote address:8.8.8.8:53Request196.187.250.142.in-addr.arpaIN PTRResponse196.187.250.142.in-addr.arpaIN PTRlhr25s33-in-f41e100net
-
GEThttp://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGJT_obwGIjABC9ENgftsfEU20AEesEIzsdToTPptt4ODzayxC5HCeUQigjvHUFVLpUcHzTIzD6UyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMJaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exeRemote address:142.250.187.196:80RequestGET /sorry/index?continue=http://www.google.com/&q=EgS117BTGJT_obwGIjABC9ENgftsfEU20AEesEIzsdToTPptt4ODzayxC5HCeUQigjvHUFVLpUcHzTIzD6UyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 429 Too Many Requests
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/html
Server: HTTP server (unknown)
Content-Length: 3075
X-XSS-Protection: 0
Connection: close
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
13.248.169.48:80http://jointhenewworldorder.com/images/pages.jpg?sv=419&tq=gJ4WK%2FSUh6zGkUR8oY%2BQrMWTUj26kJHjyZJTOrqVyaBqtUn5CGFYVw%3D%3DhttpJaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe473 B 543 B 6 6
HTTP Request
GET http://jointhenewworldorder.com/images/pages.jpg?sv=419&tq=gJ4WK%2FSUh6zGkUR8oY%2BQrMWTUj26kJHjyZJTOrqVyaBqtUn5CGFYVw%3D%3DHTTP Response
200 -
-
302 B 1.5kB 5 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
353 B 1.5kB 6 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
142.250.187.196:80http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGJT_obwGIjABC9ENgftsfEU20AEesEIzsdToTPptt4ODzayxC5HCeUQigjvHUFVLpUcHzTIzD6UyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMhttpJaffaCakes118_69ceb7f4c6e602400dc93637ae94a4b1.exe526 B 3.7kB 6 7
HTTP Request
GET http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGJT_obwGIjABC9ENgftsfEU20AEesEIzsdToTPptt4ODzayxC5HCeUQigjvHUFVLpUcHzTIzD6UyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMHTTP Response
429 -
-
-
-
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
138.32.126.40.in-addr.arpa
DNS Request
138.32.126.40.in-addr.arpa
-
136 B 129 B 2 1
DNS Request
7.98.22.2.in-addr.arpa
DNS Request
7.98.22.2.in-addr.arpa
-
70 B 102 B 1 1
DNS Request
jointhenewworldorder.com
DNS Response
13.248.169.4876.223.54.146
-
72 B 128 B 1 1
DNS Request
48.169.248.13.in-addr.arpa
-
168 B 3
-
72 B 145 B 1 1
DNS Request
-pki5isa.wwwmediahosts.com
-
146 B 147 B 2 1
DNS Request
104.219.191.52.in-addr.arpa
DNS Request
104.219.191.52.in-addr.arpa
-
70 B 143 B 1 1
DNS Request
87ktghw.hdmediastore.com
-
144 B 158 B 2 1
DNS Request
53.210.109.20.in-addr.arpa
DNS Request
53.210.109.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 144 B 1 1
DNS Request
8fivp-6j7b.firoli-sys.com
-
71 B 135 B 1 1
DNS Request
167.190.18.2.in-addr.arpa
-
144 B 147 B 2 1
DNS Request
182.129.81.91.in-addr.arpa
DNS Request
182.129.81.91.in-addr.arpa
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.187.196
-
74 B 112 B 1 1
DNS Request
196.187.250.142.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD533e6de7694912cefcca682905a7a96ec
SHA137fe272ee40e456afe4cb46ead93e5e112ec4645
SHA256e58ef5656d97e937393922a41ada1d9680d3d59d864c89dd9f66b5bfd3315da2
SHA512cb0f64636a20f3cc8455a805045ffb220436653e4a20dfd525201cade3ddf687849a63ee5a388ca0e5ae651c96302f6f739f6bc9d3766f822c9d8c58ba49559f
-
Filesize
600B
MD58e810394a4ce12f9490d6ffdca313c9d
SHA16f44e8ccd344b74d3c71ae241cf70cae621710be
SHA256b3d7b2ddb6acc19ea61a33cc89bec1ba7ca21a86a301d92d8cb3b7a9289608c7
SHA512e419c7ab8a4a9175643a53b566cdaa744e6cdef51b6b8c37600690044ee4ddc7cb8c7bfc359519737f89577c7963be7b69fdf13c21fb8a66988b0d36c00db606
-
Filesize
1KB
MD57e53c82696a82acea17e87e88215ba73
SHA1645e5858c03629951437847698c2822aafb3c61c
SHA2565388be864b40e714ac7b4d8c27beec98131840217151e88ebceb7a3bdb7a438e
SHA512aff4d88b6732c400c5e792c05df0beaf0d444cdf99eeca36b3f041abfa29935247ed6f15889bba1fe81032cc2d43eaf29c0739771146e57c26ef265d30b3b0f3