Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/01/2025, 10:11

General

  • Target

    JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe

  • Size

    172KB

  • MD5

    8888145b33aa163e5735260c9ee4059c

  • SHA1

    d9745a72ba82507e6ce9013367aa93a89eec03c9

  • SHA256

    aed03500ea174b94cd4382ddf03af3fdbf45df423f3099c9be69cf76abb588c2

  • SHA512

    7bd1c54dc88eece2bd6c3f3b5cdf9c985a531d1429714d7b533cfc0b5b2a57beb71d00a5c865536bee7847e0abee61107ee31c5acb3cc09f3f15142682738273

  • SSDEEP

    3072:boqDGUf0RRfoJLDw76Ixeki38ETjMqcE:boqY0LO6IxekisEa

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2248
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\472A.55D

    Filesize

    1KB

    MD5

    771cc0ffc51d3e4f23e5f2bd9f67848b

    SHA1

    b590e3b3c455e7e3b2b05a07c756ac3b63e4a6cd

    SHA256

    c7d25fa193323e5410534782218d801ae38c39893bbd80450b6c31f75f542dfe

    SHA512

    b9c53083331991ef6ba2b5f911278923ff37186520c2582c5fee24c98626f80f3c4a22b0ef626b5d14e2b6180f3cf06d388f6e24b51f2692507d864cb43842b0

  • C:\Users\Admin\AppData\Roaming\472A.55D

    Filesize

    600B

    MD5

    6a181eb41895b92504a15e0082982a53

    SHA1

    bf36dd00f8f9e255d711da459d300f73196b3c59

    SHA256

    e5c4c8082e86936c42876aabc65f4c6ff7d986702a0afdde38cf19123ebf071c

    SHA512

    70d0ee0db379a8a2c9d5616232cc9bad098241e38efda7ff9f009b16114f783dcfd1387bdf3e3982fab86006e807ba84a82f5aba4e15ac5e9a1231cd480d0d43

  • C:\Users\Admin\AppData\Roaming\472A.55D

    Filesize

    996B

    MD5

    73d91d9ff438449c70ba2c1222ae4787

    SHA1

    07e04a43e0914a7243f767a31d859971902481fd

    SHA256

    ae5a218139498a23e3105e6db38e406d3204b1b0b151966a8813b45f66409ffa

    SHA512

    91f15fa55990283c67e4b965a08b4ba3046976fa7f23a71c3355b92a1895506e950d4a8f69e742e9b8858cf9faef7807a86eb3564dc2f10aba45ad206c6e388f

  • memory/2084-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-13-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-78-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-185-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2248-12-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2848-80-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB