Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 21:26

General

  • Target

    JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe

  • Size

    183KB

  • MD5

    43d726c3fcb08b40a64b6b5f05abde18

  • SHA1

    d20240914846f910be266d50db6cf2d303f829e5

  • SHA256

    21ffcfe26ff5e2b7368eca613b90a94e168175f355afc6e23785442a73f0b09e

  • SHA512

    474fc849f786ef68c885809a00e45d0446dad600e32f37d5aaacb669e87cfad4b1342ca5a074a83e9ae6e596985f1e31264303115479688242cf525241c96ad9

  • SSDEEP

    3072:hzIIiglntYsALBO6tBONx+LMG/kh8rhg1rUyaYVk8r68i/kRylgEe2O0:OITHAM+BsrKFwrVLOf/NQ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe startC:\Program Files (x86)\LP\1B19\D85.exe%C:\Program Files (x86)\LP\1B19
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2728
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43d726c3fcb08b40a64b6b5f05abde18.exe startC:\Users\Admin\AppData\Roaming\9F7DE\6C81B.exe%C:\Users\Admin\AppData\Roaming\9F7DE
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\9F7DE\EAF0.F7D

    Filesize

    1KB

    MD5

    833d026e85ec1509894a7a4d66f61ea7

    SHA1

    374ec39ce7dce0d4de70c073f9bd128789042564

    SHA256

    7c9f73937f2633c9a27a22028469f326f4ba383267659fbbf207965c90aca1da

    SHA512

    4bbfc92bebd405559f43b4009a813eab02c8bffb69174e16f672f4c68404886436c2e12f185b57a7448d0f81b64c5c8bad46c27520a97187327b280d52e120d0

  • C:\Users\Admin\AppData\Roaming\9F7DE\EAF0.F7D

    Filesize

    600B

    MD5

    d5f57d04276c48aeccdabf50694df5e4

    SHA1

    ddeaa0343e327da8123273f50dc6f4080159f65e

    SHA256

    f42917fb51fe651e2681103268b75577b4d6e36d271cfc2a43e543f077ca14dc

    SHA512

    dbdd38b0208c5de0975cbc667ab323fe5450627382c252374f8e0de0c5fab2a02e9499491ab1b8ad213724226796d12969a3a8a27d58b47fa08b7b361a049cad

  • C:\Users\Admin\AppData\Roaming\9F7DE\EAF0.F7D

    Filesize

    996B

    MD5

    7dae67ba30cf60c0d26ae3288aa9bc6c

    SHA1

    edbc157b2ca4c9a4448442d01706c8ab8ccaef02

    SHA256

    0cccdc294dc4ef60c4e48d21d969d23e11c5a195f67a50deb5be0fe00c68a825

    SHA512

    398bbf497c96fc7f34be98ec4fb3a4c512b7db66dd464c4901b0dcd22260d6eebc322d45a61ab97fb657f923b789a4551396c126756336d32b3da07d1e11ff50

  • memory/2728-12-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2728-11-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2728-14-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/3564-74-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/3564-73-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4076-16-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/4076-1-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/4076-15-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4076-2-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4076-169-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB