Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2025, 17:21

General

  • Target

    JaffaCakes118_afda4e86aec193264031054ce220a488.exe

  • Size

    164KB

  • MD5

    afda4e86aec193264031054ce220a488

  • SHA1

    e509b45d8262cfc6e2d636c41db4ac02ba85054f

  • SHA256

    1d6ffa1e76aaa12880cf4f35a5ec80234497d75337734635adcf811e2b40fc48

  • SHA512

    e5d9bce8514d28e9fad7ec56cd357d6cf2de177ad60d4445a11f5e6b6c18476cf4685dc5086c3133f608127d1d3bdcff4367b7fff3c4cb5aab954bf3b12c3205

  • SSDEEP

    3072:FdJc5HBhuz3BQgObFi4L2rcbqGJwEm1HxU37RcmOg87F5XG3O65bzwT:HJnbBQg2MrjGJwErVfOg8J5XeP53wT

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 8 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afda4e86aec193264031054ce220a488.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afda4e86aec193264031054ce220a488.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afda4e86aec193264031054ce220a488.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afda4e86aec193264031054ce220a488.exe startC:\Program Files (x86)\LP\2022\033.exe%C:\Program Files (x86)\LP\2022
      2⤵
        PID:2200
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afda4e86aec193264031054ce220a488.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afda4e86aec193264031054ce220a488.exe startC:\Program Files (x86)\76C8C\lvvm.exe%C:\Program Files (x86)\76C8C
        2⤵
          PID:2924

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\CabBF2C.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarBF4F.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\28776\6C8C.877

        Filesize

        600B

        MD5

        b02319bf3700c0c7d2dd06e91b495fdb

        SHA1

        c0d7c5b876b8e40595c213656c73f078a3adcec7

        SHA256

        187ee5c8f21863a7978edfdb7a53e6f7f4271c5467f9c81b967b04f184398268

        SHA512

        074235dd609f5cefcd9d30af0ce181e6a4fab7bd5f95b1365206125a75e3b1c448e138617e65e159ec4e93b86e6b4fe9b438fe182b6038c7a02b5fedf69beb89

      • C:\Users\Admin\AppData\Roaming\28776\6C8C.877

        Filesize

        996B

        MD5

        3f373c79cdd7042c22fbd1c4d9a795d1

        SHA1

        d13cf83622a506a3b326b2835b3ba981558a21f8

        SHA256

        72cad563f658ec6beb64a58fdfc14f22ae33b5a304215660abf53d0e55479366

        SHA512

        df98424bfdc448257997ceba9627ec584bee0f55c786a860f788e0c21e8b24b08788c9c251b0b2c2507f5e1213dbafd4cceadc0e92d5c1c0b9b33dad88ca0a54

      • C:\Users\Admin\AppData\Roaming\28776\6C8C.877

        Filesize

        1KB

        MD5

        5e891c9ebef3cca492aa4177052bdf31

        SHA1

        a46fc7c9a66795a87f395ac4dd1b848034b9ccb0

        SHA256

        9c869118b57837f537784ec00ab342572d2bfaf58a784ce90d667af251399c9b

        SHA512

        a0a36e2ef8ba1b8cf9dfa06c0d9e1196ba39c1b01e174319fb802fd75f97d2e7f0a44d48cf628e4dc4f039697e87c6e486782339bc72acda02ec78b519e2f31b

      • memory/1488-19-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1488-18-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/1488-0-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1488-128-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1488-306-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1488-309-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1488-3-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1488-2-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2200-15-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2200-17-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2200-14-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2924-127-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2924-125-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB