Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2025, 18:35

General

  • Target

    JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe

  • Size

    201KB

  • MD5

    428294be76f32616ddfae8aa38f15f37

  • SHA1

    5b692612176dd7eb40f6c71578380b49a75b6c57

  • SHA256

    ee77f481606f6571a985dbbf50e101449a7546bc35bf71216fd351ec741ac991

  • SHA512

    bfa6b97edef6031de6d043a5d83daca88e2d38e7b602e072bfeae7041056c7378524d53322f194d2137515ea7a5d85270fc8a11822ec86e6ef06536def289491

  • SSDEEP

    3072:JYPVYaCbrH77ZzdfTYJ1U8e+czCeC19pVIovkh5a5MIDDOHs6kz5UEJIr0y:6VYaW7Jd87RPeCTsqk3VIWqU7rF

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\AEE8.32D

    Filesize

    1KB

    MD5

    fa9e28c45a27c6bf4fa4077b0ae00edc

    SHA1

    5f2d2ff0ee5acf780933f663e7cca24448fb0b4b

    SHA256

    0992b35abcd6af564ad8a1e07f9167fe01f02cac280ead69305bb92a917aba58

    SHA512

    d196bdc4414b48e27499ee222870e3148da73b7b533eb348811735a31f27805dbc35e4901d5707c2588883072aec30728d5f3beddf32fae27356c245dde6398d

  • C:\Users\Admin\AppData\Roaming\AEE8.32D

    Filesize

    1KB

    MD5

    e8b4a49bbf65ecf50ce1dffad998240f

    SHA1

    7143a5e3db87b865c6fa6dd5b8f5a41b7212616d

    SHA256

    a11405d098b6e8689682a291ea1329a00cc42e3185e4c2ccf8512369217d7747

    SHA512

    86d17874d06945050837425d4754b3285b3e1f2e27fc696b91df65c17a8e73e7ac11b57f006bb26bdbfe3e7384be72b92942b85ffc619e4f99d763fdb2e55810

  • C:\Users\Admin\AppData\Roaming\AEE8.32D

    Filesize

    600B

    MD5

    1faffbf7131551bcd25dc0365bc5351f

    SHA1

    21a175f857256fbd3b5e11067479a7d951eeba79

    SHA256

    59ed19d6e9e07db74ee365b1e04538fa9a559fe4d0ca383a557dbf5c213cb9cf

    SHA512

    41b7c969ae7a46d62cbc0d87bf55df3496c958cfce6553651f8a6b5d63982f56e4bf769e0b48b23398e81f54b500685b05d95f3d6a0d6fb623682809f1cee6c1

  • C:\Users\Admin\AppData\Roaming\AEE8.32D

    Filesize

    1KB

    MD5

    89015f1f7d9796d0fcff256ec50f6a6a

    SHA1

    f709268aa00c337cb62ae5c5ca1a713452f4cf23

    SHA256

    ca226abe3a9153be05f48cb678df641200123f7f7e5291c3f2eb1c09b740c0e6

    SHA512

    3d251e6dbe82272b5f25d13200694a285de1866dbc126d3f8d38e71b34e6ac82521f7e48cba086d55e0f14f313c17b71d823b5cbd759ddaaca15d1e9fb74a33c

  • memory/2680-7-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2680-5-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2860-91-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2860-92-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3052-14-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3052-1-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3052-2-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3052-184-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3052-221-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB