Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe
-
Size
384KB
-
MD5
df9a19dbd662b321e368980b7ae29201
-
SHA1
740225eea440fb063623b0c4ba4a4ba0577b0376
-
SHA256
22d833fa171f599c5ccf1e7b79567d1d2afc6154916c5fc36b190e2cd99c1664
-
SHA512
3c58f0936d40272c78bd802c8f4a3e107ce5704d1d12e5da623a043f6806f9f2d973c674b17630fdb9b8070a195920fce3abdcadc43f71ac3de41acd8a3ec82d
-
SSDEEP
6144:uhiMSxXhgodPKU4hq+WWL0zUnry/sCZkYOpee6NdRhtH2xtvTY:uhiMSF3dP5gUYLhpU30
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1304-13-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1304-14-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/1408-18-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1304-134-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1896-139-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1304-326-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1304-330-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2348 205C.tmp -
Loads dropped DLL 2 IoCs
pid Process 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\0AE.exe = "C:\\Program Files (x86)\\LP\\88C3\\0AE.exe" JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1304-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-14-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1408-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1408-18-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-134-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1896-136-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1896-137-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1896-139-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-326-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-330-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\88C3\0AE.exe JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe File opened for modification C:\Program Files (x86)\LP\88C3\0AE.exe JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe File opened for modification C:\Program Files (x86)\LP\88C3\205C.tmp JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 205C.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2232 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2096 msiexec.exe Token: SeTakeOwnershipPrivilege 2096 msiexec.exe Token: SeSecurityPrivilege 2096 msiexec.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe Token: SeShutdownPrivilege 2232 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1408 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 31 PID 1304 wrote to memory of 1408 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 31 PID 1304 wrote to memory of 1408 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 31 PID 1304 wrote to memory of 1408 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 31 PID 1304 wrote to memory of 1896 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 34 PID 1304 wrote to memory of 1896 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 34 PID 1304 wrote to memory of 1896 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 34 PID 1304 wrote to memory of 1896 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 34 PID 1304 wrote to memory of 2348 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 37 PID 1304 wrote to memory of 2348 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 37 PID 1304 wrote to memory of 2348 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 37 PID 1304 wrote to memory of 2348 1304 JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe startC:\Users\Admin\AppData\Roaming\31720\81C88.exe%C:\Users\Admin\AppData\Roaming\317202⤵
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe startC:\Program Files (x86)\20D92\lvvm.exe%C:\Program Files (x86)\20D922⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Program Files (x86)\LP\88C3\205C.tmp"C:\Program Files (x86)\LP\88C3\205C.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5d5f77f394aa58261af72b412973bc1e4
SHA1f977378c09a116546ab7da4552ea563fa1e8773c
SHA2561fcdc104e6f41bc5bf017181a8e6cab6924192a04682b57e1b44699fbfeb0b87
SHA51203a852965aeb3a3c6769fbc8ece4629307f2fc6b490a18b02d207c5bfe71fb7444a7ad6efe4d676ad63be8bfddaba8c7346cd6b70edd4aaba625450591555600
-
Filesize
600B
MD5ec7351571448d5ed7f789eb1424423a3
SHA1b8111512cf283ea569b63813ad42a40c3d7a03c5
SHA2564532dc61d4b4b1d830fca2b912c954fdec746605914f19ece322985252f007f2
SHA5129282748e3183eaccbfc1974574fe9b290e39b49c779830573d172a1068ee0516fdc85698ff86727e508312144b975406deffd3935f3d6b76e6d7db512f656b2b
-
Filesize
1KB
MD5bf1a595e5f31725692d223af29ecd958
SHA13c03b12d8db542cc7c680bc2e9115cff1102b847
SHA256ce1da59d3f38f01ca4d2702ab6eaaac81f3fb8daee126b2eb527d9268be1d3be
SHA512bc0c7a0c98d80b55278bcd5c5bc5d865b1c0eb3c225dd284e365299179baf4d826bec1b1050b4f356bce4f4c63ba5c2f9e369aae445aca9efb77cd7a57376a53
-
Filesize
99KB
MD5e30776fd4c002156aa05dcbe4157fc63
SHA177dc074bfc544251555ded2ad9ec741e7b88babe
SHA256e115c9b0524257ca624e0123ebb7cbe77cf09edb33bfed015038e95b94a8e1c8
SHA512cecac46a434ef0ddafe78252ee0b38607cd0c10f83f658f4b3259d5cf8c3779fc5cf8facbf9cfb0e218f7c67dc8baff27c4f5349bacda8bf21e212a3c47e4dbf