Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe
-
Size
201KB
-
MD5
428294be76f32616ddfae8aa38f15f37
-
SHA1
5b692612176dd7eb40f6c71578380b49a75b6c57
-
SHA256
ee77f481606f6571a985dbbf50e101449a7546bc35bf71216fd351ec741ac991
-
SHA512
bfa6b97edef6031de6d043a5d83daca88e2d38e7b602e072bfeae7041056c7378524d53322f194d2137515ea7a5d85270fc8a11822ec86e6ef06536def289491
-
SSDEEP
3072:JYPVYaCbrH77ZzdfTYJ1U8e+czCeC19pVIovkh5a5MIDDOHs6kz5UEJIr0y:6VYaW7Jd87RPeCTsqk3VIWqU7rF
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2680-7-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/3052-14-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/2860-92-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/3052-184-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot behavioral1/memory/3052-221-0x0000000000400000-0x000000000044D000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3052-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2680-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2680-7-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/3052-14-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2860-91-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2860-92-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/3052-184-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/3052-221-0x0000000000400000-0x000000000044D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2680 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 28 PID 3052 wrote to memory of 2680 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 28 PID 3052 wrote to memory of 2680 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 28 PID 3052 wrote to memory of 2680 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 28 PID 3052 wrote to memory of 2860 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 30 PID 3052 wrote to memory of 2860 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 30 PID 3052 wrote to memory of 2860 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 30 PID 3052 wrote to memory of 2860 3052 JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_428294be76f32616ddfae8aa38f15f37.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fa9e28c45a27c6bf4fa4077b0ae00edc
SHA15f2d2ff0ee5acf780933f663e7cca24448fb0b4b
SHA2560992b35abcd6af564ad8a1e07f9167fe01f02cac280ead69305bb92a917aba58
SHA512d196bdc4414b48e27499ee222870e3148da73b7b533eb348811735a31f27805dbc35e4901d5707c2588883072aec30728d5f3beddf32fae27356c245dde6398d
-
Filesize
1KB
MD5e8b4a49bbf65ecf50ce1dffad998240f
SHA17143a5e3db87b865c6fa6dd5b8f5a41b7212616d
SHA256a11405d098b6e8689682a291ea1329a00cc42e3185e4c2ccf8512369217d7747
SHA51286d17874d06945050837425d4754b3285b3e1f2e27fc696b91df65c17a8e73e7ac11b57f006bb26bdbfe3e7384be72b92942b85ffc619e4f99d763fdb2e55810
-
Filesize
600B
MD51faffbf7131551bcd25dc0365bc5351f
SHA121a175f857256fbd3b5e11067479a7d951eeba79
SHA25659ed19d6e9e07db74ee365b1e04538fa9a559fe4d0ca383a557dbf5c213cb9cf
SHA51241b7c969ae7a46d62cbc0d87bf55df3496c958cfce6553651f8a6b5d63982f56e4bf769e0b48b23398e81f54b500685b05d95f3d6a0d6fb623682809f1cee6c1
-
Filesize
1KB
MD589015f1f7d9796d0fcff256ec50f6a6a
SHA1f709268aa00c337cb62ae5c5ca1a713452f4cf23
SHA256ca226abe3a9153be05f48cb678df641200123f7f7e5291c3f2eb1c09b740c0e6
SHA5123d251e6dbe82272b5f25d13200694a285de1866dbc126d3f8d38e71b34e6ac82521f7e48cba086d55e0f14f313c17b71d823b5cbd759ddaaca15d1e9fb74a33c