Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 13:28

General

  • Target

    JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe

  • Size

    273KB

  • MD5

    e8d516a1d4cea6637adea75d8c3a5741

  • SHA1

    437ad6e0c4a77d94fdd1d6de9d07e14bcd74249c

  • SHA256

    1096bbe9d20f24b9e9f72afd59f14a256fef39b444727faaf2782c20211f615a

  • SHA512

    082b9e1942beeabd9ee7866af58d90f26e6b603693c9b034d0c1c8d432dc56add6699163e31074e9c322662f4bf92d3f79643d286a41b728c779c8bbe3f49e6b

  • SSDEEP

    6144:tNhloreqX/VThJt5VufH4pqsGEaImwlmckFMEukgD5:hyzX/3/5VDqEDmYzkF0kY

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe startC:\Users\Admin\AppData\Roaming\BC0ED\AAF5E.exe%C:\Users\Admin\AppData\Roaming\BC0ED
      2⤵
      • System Location Discovery: System Language Discovery
      PID:852
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe startC:\Program Files (x86)\ED31B\lvvm.exe%C:\Program Files (x86)\ED31B
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1084
    • C:\Program Files (x86)\LP\5E1B\5503.tmp
      "C:\Program Files (x86)\LP\5E1B\5503.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2040
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:804
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\BC0ED\D31B.C0E

    Filesize

    996B

    MD5

    7306b50546b04dfd938a6d606538b5bc

    SHA1

    17775a2615fc8d43766e9f9301cbed1970d8f0f9

    SHA256

    0a913c0ad9178af36b8b316f971dc0ff84ee7939ce2b95fe8723a40bb723bdca

    SHA512

    01c731631e461e15a751fe44a715b5bc66b26a20d518b67cc316570949e0968d1bd04c0ad66ed006dd6ada92eb9c5b41085db802e9fabe5d150cece510d47e63

  • C:\Users\Admin\AppData\Roaming\BC0ED\D31B.C0E

    Filesize

    600B

    MD5

    c7117c747447a7e05f733ddaca47c011

    SHA1

    b9c29741eac3182933eaeb442d985cb298891682

    SHA256

    75fd5bffec28e2e8defb6e972bd83cb11c730ea6e5b3f7b819003c55c75385c9

    SHA512

    048c740903b7c7834173b8f9c6ec1994884050424fc572f04a1d55608401539374ef042ca68b4f5a31c37467cccaf57c261d0df574c64fb16031cb49df099399

  • C:\Users\Admin\AppData\Roaming\BC0ED\D31B.C0E

    Filesize

    1KB

    MD5

    3bb18bbb0eed399459bd4095188502b7

    SHA1

    eadb402eb9263ef3d7092926f2ee37cd918acb90

    SHA256

    6dcbf81e1dc4952fefb3e9898214a133fa4d4f15b6ed25bfda42db5e118cf6f5

    SHA512

    74a6ba2119aa8291d4427cebcd29a8225c1e775daae343a2644d6cb26c15dbf040cf418b9591f915adb0bae2c07112d60e9cf3872cea48cf050c3b13ee036817

  • \Program Files (x86)\LP\5E1B\5503.tmp

    Filesize

    96KB

    MD5

    a26219a94cdad7b6977c8d8e8464c262

    SHA1

    41b54268d8f67973e640395f1940238e915e4521

    SHA256

    7acab258a6879bf9bb647ead7beb4d32e36334d16c49fc0642ac61cf25413866

    SHA512

    4cf35e7c7211a4fe7b210b70394a31a812f9663a516c9eb54c9c1b73acee18bd37fffe2abe54149e6b450b9adbbe89cff53a3ef1b1ff1a90d39d09b16de1d75d

  • memory/740-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/740-0-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/740-111-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/740-13-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/740-3-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/740-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/740-316-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/740-320-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/852-16-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/852-18-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/1084-113-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2040-317-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB