Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe
-
Size
172KB
-
MD5
6f17a4cf99d23dde54115ca96c76053b
-
SHA1
5fcd652c7c57737c90107c46da8824e85e3c4b9b
-
SHA256
a421f27444f744edb2e512c2f98453ec0362fc109c08e4bd49deb058d9d009f5
-
SHA512
4bb5ede29716b12496ad682a2676f0c8ab550ac86396b06e1dad940f6ff658a3e32f6bd3f9eaab55a6339f9458f56573351bb63fa74bbeb0ef6287f0bf0fcfd7
-
SSDEEP
3072:qvfypVNj8zCyOLJ59T3/5e6t5bQMD4eRUcjzkUMo22HvJMgWBGFprb:QkVNj8zCyOsxMUeec0UNHvQGjr
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2316-7-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/1944-14-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/2668-71-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot behavioral1/memory/1944-172-0x0000000000400000-0x0000000000463000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1944-2-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2316-6-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2316-7-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1944-14-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2668-72-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2668-71-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1944-172-0x0000000000400000-0x0000000000463000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2316 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 30 PID 1944 wrote to memory of 2316 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 30 PID 1944 wrote to memory of 2316 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 30 PID 1944 wrote to memory of 2316 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 30 PID 1944 wrote to memory of 2668 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 32 PID 1944 wrote to memory of 2668 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 32 PID 1944 wrote to memory of 2668 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 32 PID 1944 wrote to memory of 2668 1944 JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f17a4cf99d23dde54115ca96c76053b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58570102cc998861efcaa5a30d0984fd9
SHA1ed489298317222915a180c273a9fc367cb39ae70
SHA2565945f662566bf2cdb8352e15c453c631bf0f791f186fbb6ce465ed73b7ceff65
SHA512d7deeaf0895b880f89ec136729fe99d091681217abaa9668f0dcc28e622945dfcf85a70fd704df87219d62eb78524f5b6cb3dc0638724818d921f206393760aa
-
Filesize
600B
MD5b11a32b7de2cfb273979c41fc938c15f
SHA1ea4c742815906c4d71db9d9c82d30d3ea77dc575
SHA256a1ccad57135f4a62da1e1ba03f55acf02e1b2e1ed593f6e904b07fa41568d9f6
SHA512c5673830e787b985aec0bef41ae754c9fad1fc0461dde01f1cff9b9132370c178f626679aba25cf9f6fbf411ed0b77a9825c13cc95b36c71b1571e13952902bf
-
Filesize
996B
MD5b518644b9dfb84f6b299aa04eb2a4702
SHA11ad3662d6bedf7d520e04b0d0c4c61df91425762
SHA2563bb5c123c1f82ae81802f3263ecb3417e814cd0343ee45a26ff6efbeeb3b3a51
SHA512f101951b14e7dae4f53bea5226132f49ce6145a242af74fecc0010a8277021e22b68aea0388bcd3b3607cbecd92d4bc6f4faac31ba58b1bd04c7c11c58c6fd21