Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe
-
Size
181KB
-
MD5
43fbced0d9afb6dad1afb2d1453df515
-
SHA1
1b974c77fd26f56c9daacf32fb7e485d55a6ec89
-
SHA256
a8324544e626c81730e901110af10c4691c5b4e170820fd44b263bca1d649009
-
SHA512
c3acf5faec0d7c6c78b4122ce4c7f42843820cb1b841a22f04c901ed82dea81ef55617b0a30a236f4f4dbf34b479741ed8b23cc907e33589ef899493728e01ff
-
SSDEEP
3072:USCouxNVzz0+CF8geNeKok6WpqtPHMrzFoTgEO16Zq/27WrolUjTfg6RjjaPnCeF:U17xNV03O19okJqpMrzFohrq/27WdjjQ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2628-9-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2772-19-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/624-82-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2772-83-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2772-178-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2772-2-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2628-9-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2628-8-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2628-6-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2772-19-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/624-80-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/624-82-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2772-83-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2772-178-0x0000000000400000-0x000000000048A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2628 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 31 PID 2772 wrote to memory of 2628 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 31 PID 2772 wrote to memory of 2628 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 31 PID 2772 wrote to memory of 2628 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 31 PID 2772 wrote to memory of 624 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 33 PID 2772 wrote to memory of 624 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 33 PID 2772 wrote to memory of 624 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 33 PID 2772 wrote to memory of 624 2772 JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54df5bdc23335a502b6dbf816e4dcc640
SHA141c8cd689561f69c55b2036939a9ba984c340469
SHA256f60987ec47a431c9d4d30759db3f5412097e6e33b0258c89a1c0f9bcc0b0e504
SHA512371ba2b5ef77354d2f491b9419f1c08b64a0516acb833f2745352d65bcd3cb21f5175966b88170853d13cc7fe37aeaeec033976cd64a631d083f80a7daefed2f
-
Filesize
597B
MD5ab8d39a73b81653c9aaa92f68bfa389f
SHA12056a9d0f7f1781e741c4b07171d9319e66ce31d
SHA25633a28eaa5fe776b1c1eb941a4311507be19c1dc8ed196ed0c1707a46702b8642
SHA512115a9944f9fdef653d2e76de17ac6a0d4692e7dbea23fe4a4aa9c1cb04b4c673e79d5fac56ceada634dd299730ba1e619dab3fb4dbdfba454f2c888de286bbec
-
Filesize
897B
MD5d5327e1cb6eca51e94133f7901af7072
SHA12174ec523a8d3f00f54c6f466365b640ce3d5b94
SHA2561ce30dd8ab9ae099e91411571dc02272cb9d193bb2774cc6f0a789c2ef7d9c25
SHA512c85ce6c98eacc90e2c429c596be8905c4a7f345be7f344f1cc874ca1d4a4dc0e5a5f6935634792dc6e9ace1b26c79b0c42dfa364a25d1748a506e76a17996d53
-
Filesize
1KB
MD5b0d7a1fc5a18fcd11188211c2771c5ff
SHA1a5c911c2b93e7a101e5092fe6ea59198d95397f8
SHA2562565afdfbda4a7cd1ac108f4c9bdf7c37c416953e2bdff8128fa0d2cf61e76cd
SHA51202b3276c49bd3e7b6ab4c485fc7ec93ca77de0510d649a4eb9a64a6f3bea28abc0804559b8bec0af652f386d0ded049c59ba4e7542c27771c198545c0a762c50