Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 06:57

General

  • Target

    JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe

  • Size

    384KB

  • MD5

    df9a19dbd662b321e368980b7ae29201

  • SHA1

    740225eea440fb063623b0c4ba4a4ba0577b0376

  • SHA256

    22d833fa171f599c5ccf1e7b79567d1d2afc6154916c5fc36b190e2cd99c1664

  • SHA512

    3c58f0936d40272c78bd802c8f4a3e107ce5704d1d12e5da623a043f6806f9f2d973c674b17630fdb9b8070a195920fce3abdcadc43f71ac3de41acd8a3ec82d

  • SSDEEP

    6144:uhiMSxXhgodPKU4hq+WWL0zUnry/sCZkYOpee6NdRhtH2xtvTY:uhiMSF3dP5gUYLhpU30

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe startC:\Users\Admin\AppData\Roaming\31720\81C88.exe%C:\Users\Admin\AppData\Roaming\31720
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1408
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df9a19dbd662b321e368980b7ae29201.exe startC:\Program Files (x86)\20D92\lvvm.exe%C:\Program Files (x86)\20D92
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1896
    • C:\Program Files (x86)\LP\88C3\205C.tmp
      "C:\Program Files (x86)\LP\88C3\205C.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2348
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2096
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\31720\0D92.172

    Filesize

    996B

    MD5

    d5f77f394aa58261af72b412973bc1e4

    SHA1

    f977378c09a116546ab7da4552ea563fa1e8773c

    SHA256

    1fcdc104e6f41bc5bf017181a8e6cab6924192a04682b57e1b44699fbfeb0b87

    SHA512

    03a852965aeb3a3c6769fbc8ece4629307f2fc6b490a18b02d207c5bfe71fb7444a7ad6efe4d676ad63be8bfddaba8c7346cd6b70edd4aaba625450591555600

  • C:\Users\Admin\AppData\Roaming\31720\0D92.172

    Filesize

    600B

    MD5

    ec7351571448d5ed7f789eb1424423a3

    SHA1

    b8111512cf283ea569b63813ad42a40c3d7a03c5

    SHA256

    4532dc61d4b4b1d830fca2b912c954fdec746605914f19ece322985252f007f2

    SHA512

    9282748e3183eaccbfc1974574fe9b290e39b49c779830573d172a1068ee0516fdc85698ff86727e508312144b975406deffd3935f3d6b76e6d7db512f656b2b

  • C:\Users\Admin\AppData\Roaming\31720\0D92.172

    Filesize

    1KB

    MD5

    bf1a595e5f31725692d223af29ecd958

    SHA1

    3c03b12d8db542cc7c680bc2e9115cff1102b847

    SHA256

    ce1da59d3f38f01ca4d2702ab6eaaac81f3fb8daee126b2eb527d9268be1d3be

    SHA512

    bc0c7a0c98d80b55278bcd5c5bc5d865b1c0eb3c225dd284e365299179baf4d826bec1b1050b4f356bce4f4c63ba5c2f9e369aae445aca9efb77cd7a57376a53

  • \Program Files (x86)\LP\88C3\205C.tmp

    Filesize

    99KB

    MD5

    e30776fd4c002156aa05dcbe4157fc63

    SHA1

    77dc074bfc544251555ded2ad9ec741e7b88babe

    SHA256

    e115c9b0524257ca624e0123ebb7cbe77cf09edb33bfed015038e95b94a8e1c8

    SHA512

    cecac46a434ef0ddafe78252ee0b38607cd0c10f83f658f4b3259d5cf8c3779fc5cf8facbf9cfb0e218f7c67dc8baff27c4f5349bacda8bf21e212a3c47e4dbf

  • memory/1304-13-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1304-3-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1304-330-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1304-326-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1304-0-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1304-134-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1304-2-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/1304-14-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/1304-8-0x0000000003410000-0x000000000347B000-memory.dmp

    Filesize

    428KB

  • memory/1408-18-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1408-16-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1896-139-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1896-137-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1896-136-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2348-327-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB