Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe
-
Size
274KB
-
MD5
be32492e6aecda45740e1e93489a30ad
-
SHA1
524fab6a039db492c52ef9675900bc9369067cf2
-
SHA256
1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9
-
SHA512
70e7444716b8baeea5bb8e4768d9e2371be07d9929f1490d0d8bb2ea5045a1db5d49f77887aec1ef21f295e47a8a15246b853a50a120d543915e31b182dbf108
-
SSDEEP
6144:tmZS7byibR/cFje+5EQ1NgnrGO7+HVUuYW+:zPbk5FyZru5+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2228-74-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1864-76-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2228-205-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2444-207-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2228-370-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2228-375-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2652 D356.tmp -
Loads dropped DLL 2 IoCs
pid Process 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ADB.exe = "C:\\Program Files (x86)\\LP\\BBA3\\ADB.exe" JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2228-74-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1864-76-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2228-205-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2444-207-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2228-370-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2228-375-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\BBA3\ADB.exe JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe File opened for modification C:\Program Files (x86)\LP\BBA3\ADB.exe JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe File opened for modification C:\Program Files (x86)\LP\BBA3\D356.tmp JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D356.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1716 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2632 msiexec.exe Token: SeTakeOwnershipPrivilege 2632 msiexec.exe Token: SeSecurityPrivilege 2632 msiexec.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe Token: SeShutdownPrivilege 1716 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe 1716 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1864 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 30 PID 2228 wrote to memory of 1864 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 30 PID 2228 wrote to memory of 1864 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 30 PID 2228 wrote to memory of 1864 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 30 PID 2228 wrote to memory of 2444 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 32 PID 2228 wrote to memory of 2444 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 32 PID 2228 wrote to memory of 2444 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 32 PID 2228 wrote to memory of 2444 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 32 PID 2228 wrote to memory of 2652 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 36 PID 2228 wrote to memory of 2652 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 36 PID 2228 wrote to memory of 2652 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 36 PID 2228 wrote to memory of 2652 2228 JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe startC:\Users\Admin\AppData\Roaming\3FF48\222BB.exe%C:\Users\Admin\AppData\Roaming\3FF482⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_be32492e6aecda45740e1e93489a30ad.exe startC:\Program Files (x86)\4844E\lvvm.exe%C:\Program Files (x86)\4844E2⤵
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Program Files (x86)\LP\BBA3\D356.tmp"C:\Program Files (x86)\LP\BBA3\D356.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5fd87ad0c4b2faa265887efb77c4158a2
SHA1d762970bfeaa0ade3c1ce4e0d4ea214ed6042f84
SHA2562904f7bc53cc3a72ef0dc6719afa991a926c435744891c912d3ed834c84fa7ba
SHA5123e1c842bac0d195bb7d70c770ffd9a66bcb03b3c33a72d2fe1b22dbcd92225cde9b3ac9451296e2b99d65a5c28042da6c7894f54d3bcd9c7f0eac9bb25872573
-
Filesize
1KB
MD588eb73d92be7bc94a0a84073b1108baa
SHA14eb4dca5f50b25c80c74b63eec6d4f342a5502d1
SHA2568970bac2f36e8500a3f68e889aaada8c1d8086d360d105c0efeac03c7ac649c5
SHA51276d7b18570bceefaa9f7fd74e248539cb259b073fe56a9e0fae167a7ffd406609151c7d32c52afaec90c253dab07f2b0f44e958f32fe88b76a53f38c4bbf7d8f
-
Filesize
897B
MD51c1db02ac3b58b6ee6432acc97190a7b
SHA10c003a867cd7849fc9dd45c67d5820dea3d03141
SHA256231ad7e293668ebe6d5bcde39cd1551c66938edc22d1946e4befe4879bc1b9f2
SHA512b414763a35b1f930aedd758619572f58506a3528fae57a59a993412469c89ca1508c235aef2c206c4f26a0f355fdd77ae46691563d54378795087fb574fef002
-
Filesize
97KB
MD59a18bd23f4487c251adf429fc5a9eb48
SHA142439c39140f1ab0df8d866191c07ca36f78085f
SHA25681a27826df1f66fed1d492b5e8257a367ce535bbdb123b743493f788e2d5d39d
SHA512210dcf04da40d11dccd81ca7f3f050bdc581e5ca79f4688b4ab93e255d33733000b0a7990ad1f9f4500b9f9e9620c263cc72bc4806cedcf8920b5fb830b540e4