Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2025, 21:48

General

  • Target

    JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe

  • Size

    181KB

  • MD5

    43fbced0d9afb6dad1afb2d1453df515

  • SHA1

    1b974c77fd26f56c9daacf32fb7e485d55a6ec89

  • SHA256

    a8324544e626c81730e901110af10c4691c5b4e170820fd44b263bca1d649009

  • SHA512

    c3acf5faec0d7c6c78b4122ce4c7f42843820cb1b841a22f04c901ed82dea81ef55617b0a30a236f4f4dbf34b479741ed8b23cc907e33589ef899493728e01ff

  • SSDEEP

    3072:USCouxNVzz0+CF8geNeKok6WpqtPHMrzFoTgEO16Zq/27WrolUjTfg6RjjaPnCeF:U17xNV03O19okJqpMrzFohrq/27WdjjQ

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2628
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fbced0d9afb6dad1afb2d1453df515.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\60CF.437

    Filesize

    1KB

    MD5

    4df5bdc23335a502b6dbf816e4dcc640

    SHA1

    41c8cd689561f69c55b2036939a9ba984c340469

    SHA256

    f60987ec47a431c9d4d30759db3f5412097e6e33b0258c89a1c0f9bcc0b0e504

    SHA512

    371ba2b5ef77354d2f491b9419f1c08b64a0516acb833f2745352d65bcd3cb21f5175966b88170853d13cc7fe37aeaeec033976cd64a631d083f80a7daefed2f

  • C:\Users\Admin\AppData\Roaming\60CF.437

    Filesize

    597B

    MD5

    ab8d39a73b81653c9aaa92f68bfa389f

    SHA1

    2056a9d0f7f1781e741c4b07171d9319e66ce31d

    SHA256

    33a28eaa5fe776b1c1eb941a4311507be19c1dc8ed196ed0c1707a46702b8642

    SHA512

    115a9944f9fdef653d2e76de17ac6a0d4692e7dbea23fe4a4aa9c1cb04b4c673e79d5fac56ceada634dd299730ba1e619dab3fb4dbdfba454f2c888de286bbec

  • C:\Users\Admin\AppData\Roaming\60CF.437

    Filesize

    897B

    MD5

    d5327e1cb6eca51e94133f7901af7072

    SHA1

    2174ec523a8d3f00f54c6f466365b640ce3d5b94

    SHA256

    1ce30dd8ab9ae099e91411571dc02272cb9d193bb2774cc6f0a789c2ef7d9c25

    SHA512

    c85ce6c98eacc90e2c429c596be8905c4a7f345be7f344f1cc874ca1d4a4dc0e5a5f6935634792dc6e9ace1b26c79b0c42dfa364a25d1748a506e76a17996d53

  • C:\Users\Admin\AppData\Roaming\60CF.437

    Filesize

    1KB

    MD5

    b0d7a1fc5a18fcd11188211c2771c5ff

    SHA1

    a5c911c2b93e7a101e5092fe6ea59198d95397f8

    SHA256

    2565afdfbda4a7cd1ac108f4c9bdf7c37c416953e2bdff8128fa0d2cf61e76cd

    SHA512

    02b3276c49bd3e7b6ab4c485fc7ec93ca77de0510d649a4eb9a64a6f3bea28abc0804559b8bec0af652f386d0ded049c59ba4e7542c27771c198545c0a762c50

  • memory/624-82-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/624-80-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2628-8-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2628-6-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2628-9-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2772-19-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2772-1-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2772-83-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2772-2-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2772-178-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB