Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe
-
Size
275KB
-
MD5
0a17de1a58a49a9c70e1fe93d2660673
-
SHA1
613f8246544da665ac47f079fb5e14161481e3f5
-
SHA256
19f7b9555e742866e0a4adee1cad38da969e9a930ed68e085d9a1a5a0f76ae7f
-
SHA512
6a1af4339583fe6b0fe50948c8cf24133ae31cdd8ea42dced03d766e8b4cc5956ede82187653482589250be8ebc7b07cf407258d3fa826a49e379d6a9924f3a5
-
SSDEEP
6144:cL9HBY8C8rq+3Na4cDbxQhZQS+5E5j/JsxHlxYB/T0zms:oZLrjNs5QhZQSEE5ajxZzl
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2784-3-0x0000000000400000-0x0000000000466000-memory.dmp family_cycbot behavioral1/memory/2784-4-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2368-48-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2784-49-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1532-119-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2784-135-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2784-241-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 932 EE45.tmp -
Loads dropped DLL 2 IoCs
pid Process 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1DE.exe = "C:\\Program Files (x86)\\LP\\D3A9\\1DE.exe" JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2784-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2784-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2784-4-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2368-48-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2784-49-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1532-117-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1532-119-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2784-135-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2784-241-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\D3A9\1DE.exe JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe File created C:\Program Files (x86)\LP\D3A9\1DE.exe JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe File opened for modification C:\Program Files (x86)\LP\D3A9\EE45.tmp JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EE45.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2320 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeSecurityPrivilege 2812 msiexec.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe Token: SeShutdownPrivilege 2320 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2368 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 31 PID 2784 wrote to memory of 2368 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 31 PID 2784 wrote to memory of 2368 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 31 PID 2784 wrote to memory of 2368 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 31 PID 2784 wrote to memory of 1532 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 34 PID 2784 wrote to memory of 1532 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 34 PID 2784 wrote to memory of 1532 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 34 PID 2784 wrote to memory of 1532 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 34 PID 2784 wrote to memory of 932 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 36 PID 2784 wrote to memory of 932 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 36 PID 2784 wrote to memory of 932 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 36 PID 2784 wrote to memory of 932 2784 JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe startC:\Users\Admin\AppData\Roaming\9FB23\DAED3.exe%C:\Users\Admin\AppData\Roaming\9FB232⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673.exe startC:\Program Files (x86)\23DB9\lvvm.exe%C:\Program Files (x86)\23DB92⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Program Files (x86)\LP\D3A9\EE45.tmp"C:\Program Files (x86)\LP\D3A9\EE45.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2320
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD5b2ae80505b435a5bba86306d3b1e8564
SHA1353c5b4a0ddc6f48520a05c6701f0ec5151a2cea
SHA256a34225188f739e2f1db325cd28ca33d8d01b9d9eb5e1b8964d91f3d702f73514
SHA512c03f4cd8716173e540e990462ac601de4154155d4c1e28550b9da90051d8906a669979437c3a6074670e80653b1b8744c49208a70d2d251a84c44ca6858c364b
-
Filesize
993B
MD5df32a02b75aeace482b28415d9bd4272
SHA1c6f672dfc3359f483c6804f3ac38d6546805c504
SHA25695e30ca015b242949b7c1d7ee802a31f909bbb852c69eda07db0685e5debe32c
SHA5127c3a11aca5cfdeb88ab066cfa594e2b0d107f012baa787db2f4175fcbc4563ef54eb18f71f895e20dd62529392db4870c77325e330a742c582cb979472f76053
-
Filesize
1KB
MD595f259cc304d592b9aebaedab49ed705
SHA18de77c6c300f0676f8722004c9c99e4835a2df8c
SHA2565c484abd016d20ae094d49ddaef5bc0ad4337783f4a23fb261096a084af02b93
SHA5129d927340f9e72e4e2af2f9ed4458fcaeaea96b35d28ec04cde156520d049b26af8922ff048c803914ac47e7e8c7c4dc48a1e1d352bed9b6556e3a000a60368bc
-
Filesize
1KB
MD5bb348ee5def69ec18da90a31e3a8acc3
SHA1aef6214496fbbf92c9a54804630c04f0c95c8d8c
SHA2562b0c862c1b5b901067d484995f3267dad0e129d7f7c797ca7c9377569e2e7350
SHA512e2236cdf95b073766d299bf7936d8b75c50b481b79f756f14bb7fc0adb53ccceeb20deb5ad3377b9e596da323980539c39de3046ea00273e816ee32656199cfe
-
Filesize
597B
MD5e594739b7e073073ad2878d769c1c8e9
SHA17a9fff4d5c22842c5e62ed95ff22fd20f0c151ee
SHA2565051659243c4668ff82e5085665b523ba924c4ebbd35ae55758676d7e7ca5446
SHA512c96af7b53932516a0aeb49f20b107108c550ec2ad2ddaf4b95eb493f0e99d8ae961bcd6492335857b78369a74df25d8f09b7cab050a5feb0019965871aacbd85
-
Filesize
104KB
MD5296365f98338c7267752451423e72be1
SHA1951728a38cf1824967b036cfa2ea701912541e61
SHA25612ea8a3c0368375a8690de8439051576677a4b818f5599b57eb00264882a8bb0
SHA51283e37ecaee17f464f89b0c1437660b7856fc4bd35f28e355d6edd7b3424d2f8f95f6f3b9f7871f631051ed013cf35c544748b2d6c083c07ac095945cad4fe15c