Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
-
Size
273KB
-
MD5
e8d516a1d4cea6637adea75d8c3a5741
-
SHA1
437ad6e0c4a77d94fdd1d6de9d07e14bcd74249c
-
SHA256
1096bbe9d20f24b9e9f72afd59f14a256fef39b444727faaf2782c20211f615a
-
SHA512
082b9e1942beeabd9ee7866af58d90f26e6b603693c9b034d0c1c8d432dc56add6699163e31074e9c322662f4bf92d3f79643d286a41b728c779c8bbe3f49e6b
-
SSDEEP
6144:tNhloreqX/VThJt5VufH4pqsGEaImwlmckFMEukgD5:hyzX/3/5VDqEDmYzkF0kY
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/740-13-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/740-15-0x0000000000400000-0x0000000000467000-memory.dmp family_cycbot behavioral1/memory/852-18-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/740-111-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1084-113-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/740-316-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/740-320-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2040 5503.tmp -
Loads dropped DLL 2 IoCs
pid Process 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\424.exe = "C:\\Program Files (x86)\\LP\\5E1B\\424.exe" JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/740-3-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/740-13-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/740-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/852-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/852-18-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/740-111-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1084-113-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/740-316-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/740-320-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\5E1B\424.exe JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe File opened for modification C:\Program Files (x86)\LP\5E1B\424.exe JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe File opened for modification C:\Program Files (x86)\LP\5E1B\5503.tmp JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5503.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 892 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 804 msiexec.exe Token: SeTakeOwnershipPrivilege 804 msiexec.exe Token: SeSecurityPrivilege 804 msiexec.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 740 wrote to memory of 852 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 32 PID 740 wrote to memory of 852 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 32 PID 740 wrote to memory of 852 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 32 PID 740 wrote to memory of 852 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 32 PID 740 wrote to memory of 1084 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 34 PID 740 wrote to memory of 1084 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 34 PID 740 wrote to memory of 1084 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 34 PID 740 wrote to memory of 1084 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 34 PID 740 wrote to memory of 2040 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 37 PID 740 wrote to memory of 2040 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 37 PID 740 wrote to memory of 2040 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 37 PID 740 wrote to memory of 2040 740 JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:740 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe startC:\Users\Admin\AppData\Roaming\BC0ED\AAF5E.exe%C:\Users\Admin\AppData\Roaming\BC0ED2⤵
- System Location Discovery: System Language Discovery
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe startC:\Program Files (x86)\ED31B\lvvm.exe%C:\Program Files (x86)\ED31B2⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Program Files (x86)\LP\5E1B\5503.tmp"C:\Program Files (x86)\LP\5E1B\5503.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:804
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD57306b50546b04dfd938a6d606538b5bc
SHA117775a2615fc8d43766e9f9301cbed1970d8f0f9
SHA2560a913c0ad9178af36b8b316f971dc0ff84ee7939ce2b95fe8723a40bb723bdca
SHA51201c731631e461e15a751fe44a715b5bc66b26a20d518b67cc316570949e0968d1bd04c0ad66ed006dd6ada92eb9c5b41085db802e9fabe5d150cece510d47e63
-
Filesize
600B
MD5c7117c747447a7e05f733ddaca47c011
SHA1b9c29741eac3182933eaeb442d985cb298891682
SHA25675fd5bffec28e2e8defb6e972bd83cb11c730ea6e5b3f7b819003c55c75385c9
SHA512048c740903b7c7834173b8f9c6ec1994884050424fc572f04a1d55608401539374ef042ca68b4f5a31c37467cccaf57c261d0df574c64fb16031cb49df099399
-
Filesize
1KB
MD53bb18bbb0eed399459bd4095188502b7
SHA1eadb402eb9263ef3d7092926f2ee37cd918acb90
SHA2566dcbf81e1dc4952fefb3e9898214a133fa4d4f15b6ed25bfda42db5e118cf6f5
SHA51274a6ba2119aa8291d4427cebcd29a8225c1e775daae343a2644d6cb26c15dbf040cf418b9591f915adb0bae2c07112d60e9cf3872cea48cf050c3b13ee036817
-
Filesize
96KB
MD5a26219a94cdad7b6977c8d8e8464c262
SHA141b54268d8f67973e640395f1940238e915e4521
SHA2567acab258a6879bf9bb647ead7beb4d32e36334d16c49fc0642ac61cf25413866
SHA5124cf35e7c7211a4fe7b210b70394a31a812f9663a516c9eb54c9c1b73acee18bd37fffe2abe54149e6b450b9adbbe89cff53a3ef1b1ff1a90d39d09b16de1d75d