Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2025, 02:26

General

  • Target

    JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe

  • Size

    170KB

  • MD5

    9d3e2918e50ae03cbcd58ae01144d1c6

  • SHA1

    17492b3a942ae44404e725fda2249df2ca825d8b

  • SHA256

    a0209af2fe689faccd3c7bf436f7c0d32d43b589191380146db08d5ee4f00731

  • SHA512

    32ba7e4d1c80800bc400f8ff1a47e9864448f72ef4384eb6d4c1b2586a319444ff8e123a9fe6c01297e7dbc90e083823c4c4c1a74c7a9c37346c20919e4886a4

  • SSDEEP

    3072:QtU5tmrZIln3haDCvsCltxd5kIR+ymkPx42USPCKk/izQ:Pq1DCvsCltrhCoxLBCj

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2948
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\5748.28D

    Filesize

    1KB

    MD5

    89c3e26c0545fc1be401a79fed763a18

    SHA1

    b7e19ac2db90316e683984563c1ee3eb065b1d1f

    SHA256

    940442517dca27cc11d47d6ade2b9960c45b9c21928e30df2720018faa1787cf

    SHA512

    0d50a2b1934d0ece6625b277fe167f125445623f787d730f0cca8da493612bcf02250e24ca16a053b5c59e5e7520052c33ffb4e30b1faa74d0b83f3fcc1af7bd

  • C:\Users\Admin\AppData\Roaming\5748.28D

    Filesize

    600B

    MD5

    f0a5c92c743f03af37bfa97b83167fbb

    SHA1

    9f4f5768ff7ef209a56e722e388e53497f1c78be

    SHA256

    e02be0dcfb020fc0cdb391f75861a9b7f8d757794d067db39aa35b5b3c991ede

    SHA512

    0bf6765c102269bb639784ac294b24d7191b9e1f7a0e9481abd2866e6a1498ce787487b4133885cf362604619e7400f50f5a81c34046834fac3539619985428b

  • C:\Users\Admin\AppData\Roaming\5748.28D

    Filesize

    996B

    MD5

    a5d50d8bb819ceb4756ed3fbf91bef49

    SHA1

    c0a3293c2a377988b651bf5533aa2ccee8ff991f

    SHA256

    5257ba23216c2f268f2d31461bb2398b777f45775c012292571f6e584a4ac7d8

    SHA512

    995497f1ed5d952ea2841bc50a44e6aad1a5d466078691d8c2f30e52fee9e5dbcfec9ae5c017c9292dc7382d484d5591601c40374cef388b7ae24b346bc6b7cd

  • memory/1768-72-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1768-74-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2948-8-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2948-10-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2956-2-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2956-1-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2956-15-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/2956-185-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB