Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe
-
Size
172KB
-
MD5
8888145b33aa163e5735260c9ee4059c
-
SHA1
d9745a72ba82507e6ce9013367aa93a89eec03c9
-
SHA256
aed03500ea174b94cd4382ddf03af3fdbf45df423f3099c9be69cf76abb588c2
-
SHA512
7bd1c54dc88eece2bd6c3f3b5cdf9c985a531d1429714d7b533cfc0b5b2a57beb71d00a5c865536bee7847e0abee61107ee31c5acb3cc09f3f15142682738273
-
SSDEEP
3072:boqDGUf0RRfoJLDw76Ixeki38ETjMqcE:boqY0LO6IxekisEa
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2248-12-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2084-13-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2084-78-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2848-80-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2084-185-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe -
resource yara_rule behavioral1/memory/2084-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2248-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2084-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2084-78-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2848-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2084-185-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2248 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 31 PID 2084 wrote to memory of 2248 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 31 PID 2084 wrote to memory of 2248 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 31 PID 2084 wrote to memory of 2248 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 31 PID 2084 wrote to memory of 2848 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 33 PID 2084 wrote to memory of 2848 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 33 PID 2084 wrote to memory of 2848 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 33 PID 2084 wrote to memory of 2848 2084 JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5771cc0ffc51d3e4f23e5f2bd9f67848b
SHA1b590e3b3c455e7e3b2b05a07c756ac3b63e4a6cd
SHA256c7d25fa193323e5410534782218d801ae38c39893bbd80450b6c31f75f542dfe
SHA512b9c53083331991ef6ba2b5f911278923ff37186520c2582c5fee24c98626f80f3c4a22b0ef626b5d14e2b6180f3cf06d388f6e24b51f2692507d864cb43842b0
-
Filesize
600B
MD56a181eb41895b92504a15e0082982a53
SHA1bf36dd00f8f9e255d711da459d300f73196b3c59
SHA256e5c4c8082e86936c42876aabc65f4c6ff7d986702a0afdde38cf19123ebf071c
SHA51270d0ee0db379a8a2c9d5616232cc9bad098241e38efda7ff9f009b16114f783dcfd1387bdf3e3982fab86006e807ba84a82f5aba4e15ac5e9a1231cd480d0d43
-
Filesize
996B
MD573d91d9ff438449c70ba2c1222ae4787
SHA107e04a43e0914a7243f767a31d859971902481fd
SHA256ae5a218139498a23e3105e6db38e406d3204b1b0b151966a8813b45f66409ffa
SHA51291f15fa55990283c67e4b965a08b4ba3046976fa7f23a71c3355b92a1895506e950d4a8f69e742e9b8858cf9faef7807a86eb3564dc2f10aba45ad206c6e388f