Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe
-
Size
183KB
-
MD5
43d726c3fcb08b40a64b6b5f05abde18
-
SHA1
d20240914846f910be266d50db6cf2d303f829e5
-
SHA256
21ffcfe26ff5e2b7368eca613b90a94e168175f355afc6e23785442a73f0b09e
-
SHA512
474fc849f786ef68c885809a00e45d0446dad600e32f37d5aaacb669e87cfad4b1342ca5a074a83e9ae6e596985f1e31264303115479688242cf525241c96ad9
-
SSDEEP
3072:hzIIiglntYsALBO6tBONx+LMG/kh8rhg1rUyaYVk8r68i/kRylgEe2O0:OITHAM+BsrKFwrVLOf/NQ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/2728-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4076-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4076-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/3564-74-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4076-169-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4076-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2728-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2728-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4076-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4076-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3564-73-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3564-74-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4076-169-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2728 4076 JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe 84 PID 4076 wrote to memory of 2728 4076 JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe 84 PID 4076 wrote to memory of 2728 4076 JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe 84 PID 4076 wrote to memory of 3564 4076 JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe 85 PID 4076 wrote to memory of 3564 4076 JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe 85 PID 4076 wrote to memory of 3564 4076 JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe startC:\Program Files (x86)\LP\1B19\D85.exe%C:\Program Files (x86)\LP\1B192⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe startC:\Users\Admin\AppData\Roaming\9F7DE\6C81B.exe%C:\Users\Admin\AppData\Roaming\9F7DE2⤵
- System Location Discovery: System Language Discovery
PID:3564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5833d026e85ec1509894a7a4d66f61ea7
SHA1374ec39ce7dce0d4de70c073f9bd128789042564
SHA2567c9f73937f2633c9a27a22028469f326f4ba383267659fbbf207965c90aca1da
SHA5124bbfc92bebd405559f43b4009a813eab02c8bffb69174e16f672f4c68404886436c2e12f185b57a7448d0f81b64c5c8bad46c27520a97187327b280d52e120d0
-
Filesize
600B
MD5d5f57d04276c48aeccdabf50694df5e4
SHA1ddeaa0343e327da8123273f50dc6f4080159f65e
SHA256f42917fb51fe651e2681103268b75577b4d6e36d271cfc2a43e543f077ca14dc
SHA512dbdd38b0208c5de0975cbc667ab323fe5450627382c252374f8e0de0c5fab2a02e9499491ab1b8ad213724226796d12969a3a8a27d58b47fa08b7b361a049cad
-
Filesize
996B
MD57dae67ba30cf60c0d26ae3288aa9bc6c
SHA1edbc157b2ca4c9a4448442d01706c8ab8ccaef02
SHA2560cccdc294dc4ef60c4e48d21d969d23e11c5a195f67a50deb5be0fe00c68a825
SHA512398bbf497c96fc7f34be98ec4fb3a4c512b7db66dd464c4901b0dcd22260d6eebc322d45a61ab97fb657f923b789a4551396c126756336d32b3da07d1e11ff50