Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2025, 19:17

General

  • Target

    JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe

  • Size

    165KB

  • MD5

    42de217ac3e95dc6c645587ce84382fa

  • SHA1

    b9e6b3e09a3ba79c1b7e4dd90c930b7056b1d620

  • SHA256

    ed1fc023df3c29977c5758b36e5435ffbc276dec7161c021de2dcb060d196d05

  • SHA512

    cc1bd127b1e3f5c73f0bf6db176631bc7340dca424957bb02b4edbff8d2fadd77c8003526287a053e382f441a890e1d9d8c9e26fe6086134b2e5e4387d17c269

  • SSDEEP

    3072:T1sth1TC+d7CT4mj0TkECn1tNPD69PTyrpNbfMM/i6nYENnIlvhlzWEUsKT9rDiX:Tmthpd7CF0Tkb1/wG3fjvYknIxnesKxv

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe startC:\Program Files (x86)\LP\B8AC\2F2.exe%C:\Program Files (x86)\LP\B8AC
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2880
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe startC:\Program Files (x86)\F7750\lvvm.exe%C:\Program Files (x86)\F7750
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\CEDF7\7750.EDF

    Filesize

    996B

    MD5

    be37efcb0cf2a5e8d3e5b59c1e9cfb74

    SHA1

    c9bd91a95a3d61d7a683a36aa78e43552c96f609

    SHA256

    a207f05c04e5cc73049c83480bb981830a495556689f7d7d6182f6bb5b9d9595

    SHA512

    620c5d61598bebf684b20a51bf4ac1e5fe72961891a64bf05e441ba3972eb594d2cf958783fd7761e9eb2a5b61a92eb2fcb6f1936df8623c90036d37ab34d43d

  • C:\Users\Admin\AppData\Roaming\CEDF7\7750.EDF

    Filesize

    600B

    MD5

    ba725451bfc91d22a38348cf0810b73e

    SHA1

    7d6eca2bc6a8897dcd1ad65c9231124f8fafa86f

    SHA256

    6de20e2ad5037fc80739503142896517470b60c057c07bc8bcbece8611466649

    SHA512

    d725b6afcd3e768d2a5522216dafbe0ab37fbd30aaf42effe1e353a25fd1327776dc3b0f99b31e45005d9427bb2ec994f219fb33e1414d3e1161d5110a8a81af

  • C:\Users\Admin\AppData\Roaming\CEDF7\7750.EDF

    Filesize

    1KB

    MD5

    b93c1f5d5ee08218c67bc2d6993a38e4

    SHA1

    f92d8d7b14477d68c289ea6f7a84129a7e7ec010

    SHA256

    055c4340f16c5126c76e9385e2e91dfe6aa0437629ce386072c523a351a945cb

    SHA512

    decccebc82ce16b343b98fc69f567fa46213c10c6664e575bff38a89481bb61541a82c1b0c4d748baf39710331a3091525822b9641bd2ef2cfc173d262ff5235

  • memory/1564-134-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1564-133-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1564-131-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2880-14-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2880-15-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3032-17-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/3032-16-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3032-0-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3032-135-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3032-3-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3032-2-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/3032-313-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB