Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe
-
Size
187KB
-
MD5
bb9694e4fdd7556909779f2aca72ed07
-
SHA1
e74fefd342e8bda5363c96f2fe0224c013e57957
-
SHA256
1195b6e737271930b417d14b43b0d48259ba52ec9337ac63ffaa21197d8efa51
-
SHA512
fe176e3171e0b42d63d5b6ff69eb2202d21fdbd2a159bd6d788892dedf15a730f8f49a981c4a3f781b2babfd1319f283c1574439618f22ee1632d12e2dbfcba3
-
SSDEEP
3072:SZ8AZL/T1YtPqk1Njc4e+jvMyiZ81i8qjmfgak05DoA38OiD+pUZgLe0JR8zc7H1:SZ8KT1Ytik1vTJiScAZk05DoAudgLeaP
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2808-6-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/988-13-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2080-79-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/988-181-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/988-1-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2808-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2808-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/988-13-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2080-77-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2080-79-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/988-181-0x0000000000400000-0x0000000000468000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 988 wrote to memory of 2808 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 31 PID 988 wrote to memory of 2808 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 31 PID 988 wrote to memory of 2808 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 31 PID 988 wrote to memory of 2808 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 31 PID 988 wrote to memory of 2080 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 33 PID 988 wrote to memory of 2080 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 33 PID 988 wrote to memory of 2080 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 33 PID 988 wrote to memory of 2080 988 JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bb9694e4fdd7556909779f2aca72ed07.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD540f39f921031acb1a211c28db0e0043e
SHA1f1d7e1dfbd050e9fa46c320b0ea2ad769faef352
SHA2565b402d95bab2a6dcc48430e30d06d6633ba08daead43f9f44722b24f76f1d89e
SHA512b0935976a02b893f4cf0aa4361c2a466ac5d7cae98f13c2ee65950af98dc0a4ae809c7e35b559834c22d04bd3fcabfe79769d3130cff0146b78fc08fc2aadc6c
-
Filesize
600B
MD5baa44df9747ae486032b4c2a3d9e1613
SHA1b9c13f4d910f057b888e491b51fa0c0ad98c7714
SHA256a7b8bc208162d7e742b11d06355076d53ccf28ae3305733621c5661c31d04d19
SHA5125446a86ff00e4fa7d3ededd8908dde9bd51c05e57e9a74a2601e66691f5680aec650613b0ce9f071cc5afc173df11b34cab40f5d4047e1039d4bbb090abcc025
-
Filesize
996B
MD54877e658f93d5e08a6070cb56a227eb3
SHA1cdf29ac9b6044154ca55011f3cd39f8238822719
SHA256f901c959c47ece1d49aa79fcd08c6ab91746a3258c866aa00ad0a4baf266a6c5
SHA51231b351d4363daba0916042b39e2642c91afd0fdc4265c794b5341cad1d2ad0827c7df3b9a458c0007ea35291856bd06bc6682963c1962b64caa0789cea5ecb25