Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/01/2025, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe
-
Size
170KB
-
MD5
9d3e2918e50ae03cbcd58ae01144d1c6
-
SHA1
17492b3a942ae44404e725fda2249df2ca825d8b
-
SHA256
a0209af2fe689faccd3c7bf436f7c0d32d43b589191380146db08d5ee4f00731
-
SHA512
32ba7e4d1c80800bc400f8ff1a47e9864448f72ef4384eb6d4c1b2586a319444ff8e123a9fe6c01297e7dbc90e083823c4c4c1a74c7a9c37346c20919e4886a4
-
SSDEEP
3072:QtU5tmrZIln3haDCvsCltxd5kIR+ymkPx42USPCKk/izQ:Pq1DCvsCltrhCoxLBCj
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2948-10-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2956-15-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1768-74-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2956-185-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2956-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2948-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2948-10-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2956-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1768-72-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1768-74-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2956-185-0x0000000000400000-0x000000000046C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2948 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 30 PID 2956 wrote to memory of 2948 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 30 PID 2956 wrote to memory of 2948 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 30 PID 2956 wrote to memory of 2948 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 30 PID 2956 wrote to memory of 1768 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 32 PID 2956 wrote to memory of 1768 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 32 PID 2956 wrote to memory of 1768 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 32 PID 2956 wrote to memory of 1768 2956 JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d3e2918e50ae03cbcd58ae01144d1c6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD589c3e26c0545fc1be401a79fed763a18
SHA1b7e19ac2db90316e683984563c1ee3eb065b1d1f
SHA256940442517dca27cc11d47d6ade2b9960c45b9c21928e30df2720018faa1787cf
SHA5120d50a2b1934d0ece6625b277fe167f125445623f787d730f0cca8da493612bcf02250e24ca16a053b5c59e5e7520052c33ffb4e30b1faa74d0b83f3fcc1af7bd
-
Filesize
600B
MD5f0a5c92c743f03af37bfa97b83167fbb
SHA19f4f5768ff7ef209a56e722e388e53497f1c78be
SHA256e02be0dcfb020fc0cdb391f75861a9b7f8d757794d067db39aa35b5b3c991ede
SHA5120bf6765c102269bb639784ac294b24d7191b9e1f7a0e9481abd2866e6a1498ce787487b4133885cf362604619e7400f50f5a81c34046834fac3539619985428b
-
Filesize
996B
MD5a5d50d8bb819ceb4756ed3fbf91bef49
SHA1c0a3293c2a377988b651bf5533aa2ccee8ff991f
SHA2565257ba23216c2f268f2d31461bb2398b777f45775c012292571f6e584a4ac7d8
SHA512995497f1ed5d952ea2841bc50a44e6aad1a5d466078691d8c2f30e52fee9e5dbcfec9ae5c017c9292dc7382d484d5591601c40374cef388b7ae24b346bc6b7cd