Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2025, 05:07

General

  • Target

    JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe

  • Size

    274KB

  • MD5

    be32492e6aecda45740e1e93489a30ad

  • SHA1

    524fab6a039db492c52ef9675900bc9369067cf2

  • SHA256

    1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9

  • SHA512

    70e7444716b8baeea5bb8e4768d9e2371be07d9929f1490d0d8bb2ea5045a1db5d49f77887aec1ef21f295e47a8a15246b853a50a120d543915e31b182dbf108

  • SSDEEP

    6144:tmZS7byibR/cFje+5EQ1NgnrGO7+HVUuYW+:zPbk5FyZru5+

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe startC:\Users\Admin\AppData\Roaming\3FF48\222BB.exe%C:\Users\Admin\AppData\Roaming\3FF48
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1864
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe startC:\Program Files (x86)\4844E\lvvm.exe%C:\Program Files (x86)\4844E
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2444
    • C:\Program Files (x86)\LP\BBA3\D356.tmp
      "C:\Program Files (x86)\LP\BBA3\D356.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2652
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2632
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3FF48\844E.FF4

    Filesize

    597B

    MD5

    fd87ad0c4b2faa265887efb77c4158a2

    SHA1

    d762970bfeaa0ade3c1ce4e0d4ea214ed6042f84

    SHA256

    2904f7bc53cc3a72ef0dc6719afa991a926c435744891c912d3ed834c84fa7ba

    SHA512

    3e1c842bac0d195bb7d70c770ffd9a66bcb03b3c33a72d2fe1b22dbcd92225cde9b3ac9451296e2b99d65a5c28042da6c7894f54d3bcd9c7f0eac9bb25872573

  • C:\Users\Admin\AppData\Roaming\3FF48\844E.FF4

    Filesize

    1KB

    MD5

    88eb73d92be7bc94a0a84073b1108baa

    SHA1

    4eb4dca5f50b25c80c74b63eec6d4f342a5502d1

    SHA256

    8970bac2f36e8500a3f68e889aaada8c1d8086d360d105c0efeac03c7ac649c5

    SHA512

    76d7b18570bceefaa9f7fd74e248539cb259b073fe56a9e0fae167a7ffd406609151c7d32c52afaec90c253dab07f2b0f44e958f32fe88b76a53f38c4bbf7d8f

  • C:\Users\Admin\AppData\Roaming\3FF48\844E.FF4

    Filesize

    897B

    MD5

    1c1db02ac3b58b6ee6432acc97190a7b

    SHA1

    0c003a867cd7849fc9dd45c67d5820dea3d03141

    SHA256

    231ad7e293668ebe6d5bcde39cd1551c66938edc22d1946e4befe4879bc1b9f2

    SHA512

    b414763a35b1f930aedd758619572f58506a3528fae57a59a993412469c89ca1508c235aef2c206c4f26a0f355fdd77ae46691563d54378795087fb574fef002

  • \Program Files (x86)\LP\BBA3\D356.tmp

    Filesize

    97KB

    MD5

    9a18bd23f4487c251adf429fc5a9eb48

    SHA1

    42439c39140f1ab0df8d866191c07ca36f78085f

    SHA256

    81a27826df1f66fed1d492b5e8257a367ce535bbdb123b743493f788e2d5d39d

    SHA512

    210dcf04da40d11dccd81ca7f3f050bdc581e5ca79f4688b4ab93e255d33733000b0a7990ad1f9f4500b9f9e9620c263cc72bc4806cedcf8920b5fb830b540e4

  • memory/1864-76-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2228-0-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2228-74-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2228-205-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2228-370-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2228-375-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2444-207-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2652-371-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB