Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe
-
Size
283KB
-
MD5
0d1c53aa825a5a8e8a22265d7cf37304
-
SHA1
52168ece549e3d1e120be0223c33049c53c3bd47
-
SHA256
3b7cf5764f4bf5a73e78f77e78e14ffa8d31a4193e776f186074d0345dad6822
-
SHA512
1394082be89a35cef9789262e46a2281b7cc61d6b17c5c184f9cd181050adc3835e34c05d26cd87f8433cdd20675c29c30d0eb382377e69670d9e030f96f3fba
-
SSDEEP
6144:+3lmZYHtWMKvxukxLrgSqGswQ9gDpsiMYU2p1nuaSND:WlEYMf8kd0SGiMYboLB
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1172-15-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/1172-16-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2384-17-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2384-18-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/1988-82-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2384-83-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2384-168-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2384-200-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1716 65E4.tmp -
Loads dropped DLL 2 IoCs
pid Process 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\9FB.exe = "C:\\Program Files (x86)\\LP\\4675\\9FB.exe" JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2384-2-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1172-15-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1172-16-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2384-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2384-18-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1988-81-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1988-82-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2384-83-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2384-168-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2384-200-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\4675\9FB.exe JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe File opened for modification C:\Program Files (x86)\LP\4675\65E4.tmp JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe File opened for modification C:\Program Files (x86)\LP\4675\9FB.exe JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65E4.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2764 msiexec.exe Token: SeTakeOwnershipPrivilege 2764 msiexec.exe Token: SeSecurityPrivilege 2764 msiexec.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe Token: SeShutdownPrivilege 3008 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1172 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 31 PID 2384 wrote to memory of 1172 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 31 PID 2384 wrote to memory of 1172 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 31 PID 2384 wrote to memory of 1172 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 31 PID 2384 wrote to memory of 1988 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 33 PID 2384 wrote to memory of 1988 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 33 PID 2384 wrote to memory of 1988 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 33 PID 2384 wrote to memory of 1988 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 33 PID 2384 wrote to memory of 1716 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 35 PID 2384 wrote to memory of 1716 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 35 PID 2384 wrote to memory of 1716 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 35 PID 2384 wrote to memory of 1716 2384 JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe startC:\Users\Admin\AppData\Roaming\5C684\4FA46.exe%C:\Users\Admin\AppData\Roaming\5C6842⤵
- System Location Discovery: System Language Discovery
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d1c53aa825a5a8e8a22265d7cf37304.exe startC:\Program Files (x86)\84C36\lvvm.exe%C:\Program Files (x86)\84C362⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Program Files (x86)\LP\4675\65E4.tmp"C:\Program Files (x86)\LP\4675\65E4.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53fb50514f7df256ec046258266313d86
SHA1afb5dc3a03314b95c5da624f22da58667010bac8
SHA256f2641a649b8c8f23b22eae6c04bfa987d3030e4e3afa87437750b297eb41bcc8
SHA512e2538d1a57a4a73c1be12db19ff28cc57a826fe1a5ab45673fa4d734321867f642c005ea5c8a7ca9eb2963d29507c36a16cae39bfc5729f9a3730f82d1fa2aa8
-
Filesize
1KB
MD586cd2f0854be993806f5f1e5484b3032
SHA19f73200b9994a19e03737881107c0a4239c4c851
SHA256fbc15e5fcb3230ba29dab7dd20786ad3433944f4b3797d901f3c259ed37e89e6
SHA512cd5fcb0a45ed6ca89e9cac02d5efbdb3daeef0922e56565471bf0d7fbe37debf6cc199783aa14231d1bd65f8fd5f381fd96132ecf75932471ad20f516783711a
-
Filesize
600B
MD5386e4dc3cfe37a77d043aabf1019f738
SHA1ac429733fe2a25c9ee444f049d2704e91f187f05
SHA2562e4e65dbde8fdb251c9395614c68743611cda9c60b1eace50b599add26dbafcd
SHA512e6e19f2e7cf7044045f4bcc56458c2bbdaf1f6c1acbfe499b55b5bf678684ca556f4448c498045a1757cbabb4ef628b61a280798b170107a0fda3333ee64e5ed
-
Filesize
100KB
MD5bc4366d0a577f23038c4078b9daa6529
SHA1057b8992c93e8eb027190cddf22b4953b2038418
SHA256a5b375d932be3fa254012d6a15047dbdde68744fb323cada056bf1056a36a627
SHA512e29f546c1d978e3663872c8a532ec8f4c05c06b14554f06f6403cd049d202a9c6cdc73f8955ba0e8215e5ef1dbdbf40f61d6ed6ccdfaa70f8033c18c346ca274