Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe
-
Size
189KB
-
MD5
7f57bb055fa2ec175d379c44a87c85b4
-
SHA1
d9daee9400ec5ae2468f2be9651e86987fb7749d
-
SHA256
4db1a9b4a76c18d9ad024b51287ec586578ea6071f349a4cce573e43116e5de1
-
SHA512
868fc222ab90c04995a07810838e524c6d639c847a374cbc65dca118e549b4f70e91565e0bfbfd95d2cf51253671a14ecd9d9ee570be35f62d35601180d2be63
-
SSDEEP
3072:WfGeoZEG/GJQmcNOfq+3OCIfPZyXytHpML7zmhWjw8m9ct2BCXW+YBg:WftoZEd6tJPUCJMKhWjfm9n2Wng
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1740-7-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2312-14-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2312-82-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2608-84-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot behavioral1/memory/2312-197-0x0000000000400000-0x0000000000447000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2312-2-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/1740-5-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/1740-7-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2312-14-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2312-82-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2608-84-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2312-197-0x0000000000400000-0x0000000000447000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1740 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 31 PID 2312 wrote to memory of 1740 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 31 PID 2312 wrote to memory of 1740 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 31 PID 2312 wrote to memory of 1740 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 31 PID 2312 wrote to memory of 2608 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 33 PID 2312 wrote to memory of 2608 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 33 PID 2312 wrote to memory of 2608 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 33 PID 2312 wrote to memory of 2608 2312 JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f57bb055fa2ec175d379c44a87c85b4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5844e18751e4d103fce0c1d31d8908515
SHA1cc61325caaed08d0fc3dcb1a680f4c83495b925d
SHA256e65202b07a72813a564ba7444f26d5511e7393c7fe46c7f68305fc4022bbb2b3
SHA51229d1478383a18999c888be4db5731b624eb7f71267a8fce42b944f77ebe22582bd8f53e6c837ac4199e95174dd595f226d9cac299feeae0595fed679e3acca94
-
Filesize
600B
MD5eab6f10ba37a396628d1bb631bfa611b
SHA13392f5ee71b73ce8a6d81ac07dd9c55a2acabfef
SHA256f235e9493d4724b0a44274fa36209031f78bb188d6fe18638c55c7eca25abbe9
SHA512fd29d782eab5f48b5943e5f2f56e404845ea1e1439b8c85cc61642cbc1085c1323538a5d5db2aaa658c181cb7564a31762f3afed03e54b5ab3d1aa47a86253ee
-
Filesize
996B
MD5bd11952d34761d015cfad9548bace964
SHA1a9ef896dab43c9148bcf5bb324eed5b5e17c143e
SHA25638481c508afa86b7e729bec4af06404942d5dac71d5dae0debefc765d54fd9f2
SHA512edd714ad313d19feb6f4adc886a3a6bd1820487f236dbd36537000a8fa3cd6c08289b547620ab5157df470e571efd99325258e5d393211f19a6ef21aab8427e5