Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/01/2025, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe
-
Size
270KB
-
MD5
b5e7487f16e273509b6e45575c6f903e
-
SHA1
1938f36acfc8bf52b861913d6419b97792d9ad52
-
SHA256
2a47b1ff0a750b6134a6e4b1cba26a523622582bda25431c1821eb7f53a7dcc3
-
SHA512
b64948ff0b53b4d6a2b580a39891f1c8b51c8269756948728810077a7bfa7c8a3bb27dab7df994871e6ae1687f8b7d09ccdc262a968478cfe3a7e4622d51e4fd
-
SSDEEP
6144:EoKr7OzCIW199+E8GrRXvU6Scz71Csm7ZUnZzQyO8XcPE80nj9ZI:M/OWD+SrR/NlCsm7ZNyO8XcAnj9u
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1624-12-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2140-18-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1624-15-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/1624-130-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2312-132-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1624-295-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1624-300-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1572 5496.tmp -
Loads dropped DLL 2 IoCs
pid Process 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\D5A.exe = "C:\\Program Files (x86)\\LP\\8E3E\\D5A.exe" JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1624-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1624-12-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2140-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2140-18-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1624-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1624-130-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2312-132-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1624-295-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1624-300-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\8E3E\D5A.exe JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe File opened for modification C:\Program Files (x86)\LP\8E3E\D5A.exe JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe File opened for modification C:\Program Files (x86)\LP\8E3E\5496.tmp JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5496.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 748 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 3024 msiexec.exe Token: SeTakeOwnershipPrivilege 3024 msiexec.exe Token: SeSecurityPrivilege 3024 msiexec.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe Token: SeShutdownPrivilege 748 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2140 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 32 PID 1624 wrote to memory of 2140 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 32 PID 1624 wrote to memory of 2140 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 32 PID 1624 wrote to memory of 2140 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 32 PID 1624 wrote to memory of 2312 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 34 PID 1624 wrote to memory of 2312 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 34 PID 1624 wrote to memory of 2312 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 34 PID 1624 wrote to memory of 2312 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 34 PID 1624 wrote to memory of 1572 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 37 PID 1624 wrote to memory of 1572 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 37 PID 1624 wrote to memory of 1572 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 37 PID 1624 wrote to memory of 1572 1624 JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe startC:\Users\Admin\AppData\Roaming\E43EC\DBD8E.exe%C:\Users\Admin\AppData\Roaming\E43EC2⤵PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b5e7487f16e273509b6e45575c6f903e.exe startC:\Program Files (x86)\EC75E\lvvm.exe%C:\Program Files (x86)\EC75E2⤵PID:2312
-
-
C:\Program Files (x86)\LP\8E3E\5496.tmp"C:\Program Files (x86)\LP\8E3E\5496.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:748
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5dcef4b9930bd2ace6aeb11a8b46c43c7
SHA1e884410f681fb233b8f029902a7150235577a6d5
SHA256accbb35c8fc1bb7bcfb255c34398dc1e5f96d1480a7afc106f5160452be8a7b1
SHA51224e96f67090bad403ddc5bf6a2c6e006d878827193436388e4718e3e5f4c00a24a293eb6bd1edd0c754276cfd433d30d92df21bfeb14c04f876b65d286a2ea68
-
Filesize
600B
MD516c88a23da5669f5db17bbbf5e6a8822
SHA138a0b2cf68008fff12bb0fe1a5a1252e9504818f
SHA2562a7191ff0b4cfd929cf32a1999e633b59fda0fe2d9e3548391434fef9dd68d74
SHA51270778cc58e7ce9f4ebf06e25b97aa2d7d8b6eee4d5e73d06db70fa4d23326793582e0ccb3496118a201f7aba5f27972fdb0fb2a64857b6b2623af983b443fdfa
-
Filesize
1KB
MD5b6d99141ac3b68ee9686f0076dc6f24c
SHA112cfd497a7641da0e1ed438332f03bcf84c55a38
SHA25648cbb340c17d0bf1b2848d222d3a13eead3aca524b1f7055161aa975df0e17b8
SHA5124c9fb19c5dfa4be19a776bdb58f43a5dd8cf6d53996ccbc10d844a798a6a8fe885b42c7d6351290ad7f9f3deb3e9335511c040d418ed33565dfce8401b717190
-
Filesize
97KB
MD584ce8c9143b157d8bf7d0c5a4f20ff50
SHA1ce357889f51586db71692fbbc7a75b6fd3a8f740
SHA25674498e5865dd496341e4b42152083ed8450a4554e51070206fcd6d24b91899bd
SHA512a02972319bf1257d1ec91a0fe5bd2ab5b7c1161d35bdc863f96033cb1e2d892d2eabf79f6acf72aceefe916893fad48420a97c92475bcdd0b91dd4936ecdcac5