Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2025, 11:23

General

  • Target

    JaffaCakes118_c659bd947a937c9b68717034c48d2c2d.exe

  • Size

    168KB

  • MD5

    c659bd947a937c9b68717034c48d2c2d

  • SHA1

    fe84f049a961c9f7cd9d65e09a2bc40b97ab0b16

  • SHA256

    24dda5a1b590c108ca7ee3eeac132705a845abacac716c5c7673a941efd881e5

  • SHA512

    9ba06f70a51561482631c76f33aa3eb5eec7fce47a27d4f247df123f59a5a7f7a9bebe49178fac47a3bfcaff98b5feadf980d7b15702905187300bf305635f07

  • SSDEEP

    3072:UhSzIiBfIqd7oIQo1y3V083XhVlG0vFduuVFIl+kDw6KtTUqIrDAO5hWEW/8yB2a:3Kqek1yF0qX9Fd6lzDwlTUFfp5xX4

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c659bd947a937c9b68717034c48d2c2d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c659bd947a937c9b68717034c48d2c2d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c659bd947a937c9b68717034c48d2c2d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c659bd947a937c9b68717034c48d2c2d.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2176
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c659bd947a937c9b68717034c48d2c2d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c659bd947a937c9b68717034c48d2c2d.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4159.085

    Filesize

    597B

    MD5

    f17790f24d7014fecfb1f29998509473

    SHA1

    aad8fbd35fbbb1dd6f0af699e924673cd92e0520

    SHA256

    015c9b7a498cfb8a4b712b2b1696a5708bfd4adede68d51ec6c81b0e533ab0bf

    SHA512

    6af628d92c9149120033a400702aae7ded41d73f3083959af914646c39cba93450df3d304429800bcf1e32e005794b7fd5b4bf068519f6d259c17d8a069ca056

  • C:\Users\Admin\AppData\Roaming\4159.085

    Filesize

    1KB

    MD5

    7253e07b00fa070663587d5c5ce55b97

    SHA1

    b5df6bcacb9adc7456b855ee4faef29b82154fab

    SHA256

    d89add8f783741fd9c2c22c252f3ae44ef754827e8ccd8ff44f5c7c2d3bdb7cd

    SHA512

    466fad440619bb7b3fe0bce04814a8ac1602b3dd3a3571034b2f70805d98b1a35d23d2be0517d4063df80d05e61fa5da0313fc304575ebe0bbd5531a51af10ac

  • C:\Users\Admin\AppData\Roaming\4159.085

    Filesize

    897B

    MD5

    b00a8d7097b9a7383049e33d7b4cc56a

    SHA1

    f437c9ab5f96d43b81e1cbbe9090c05aafa5c7f3

    SHA256

    0019752d69740fdb8ea5d76657b6c626a223e2aad8abe596c01f06f9301ffd77

    SHA512

    7151bc264e77cb2f0241e70ae3cede0b29b27cb508c6093bf7d012cc964309e9e9d980f99efafcbf87a2380b4053d43e85a6eb7b74f9054f4f12fcd697652189

  • C:\Users\Admin\AppData\Roaming\4159.085

    Filesize

    1KB

    MD5

    9a3b5715c6cc263fc0841a9e3ea06076

    SHA1

    c913fa85cc7af00a084a73bf6186312c4ca3c2a2

    SHA256

    7374a01b9b4d8d0e3555282057c5c214da6dd29469c57beebe673a012a021b01

    SHA512

    cb0357d709f59b545716f4047710d612fd26294dfdfce54953be1cdb47fb002688534f831414793eb6c9ee300f8c8bb5e14bacae593d6620111d9c7942d402a0

  • memory/1992-2-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1992-192-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1992-1-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1992-20-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1992-187-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1992-150-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2176-9-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2176-7-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2392-87-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2392-85-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB