Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe
-
Size
165KB
-
MD5
42de217ac3e95dc6c645587ce84382fa
-
SHA1
b9e6b3e09a3ba79c1b7e4dd90c930b7056b1d620
-
SHA256
ed1fc023df3c29977c5758b36e5435ffbc276dec7161c021de2dcb060d196d05
-
SHA512
cc1bd127b1e3f5c73f0bf6db176631bc7340dca424957bb02b4edbff8d2fadd77c8003526287a053e382f441a890e1d9d8c9e26fe6086134b2e5e4387d17c269
-
SSDEEP
3072:T1sth1TC+d7CT4mj0TkECn1tNPD69PTyrpNbfMM/i6nYENnIlvhlzWEUsKT9rDiX:Tmthpd7CF0Tkb1/wG3fjvYknIxnesKxv
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2880-14-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/3032-16-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/3032-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/1564-134-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/3032-135-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/3032-313-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\CEDF7\\62FB8.exe" JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3032-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2880-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2880-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3032-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3032-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1564-133-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1564-134-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3032-135-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3032-313-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2880 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 30 PID 3032 wrote to memory of 2880 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 30 PID 3032 wrote to memory of 2880 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 30 PID 3032 wrote to memory of 2880 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 30 PID 3032 wrote to memory of 1564 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 32 PID 3032 wrote to memory of 1564 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 32 PID 3032 wrote to memory of 1564 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 32 PID 3032 wrote to memory of 1564 3032 JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe startC:\Program Files (x86)\LP\B8AC\2F2.exe%C:\Program Files (x86)\LP\B8AC2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42de217ac3e95dc6c645587ce84382fa.exe startC:\Program Files (x86)\F7750\lvvm.exe%C:\Program Files (x86)\F77502⤵
- System Location Discovery: System Language Discovery
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5be37efcb0cf2a5e8d3e5b59c1e9cfb74
SHA1c9bd91a95a3d61d7a683a36aa78e43552c96f609
SHA256a207f05c04e5cc73049c83480bb981830a495556689f7d7d6182f6bb5b9d9595
SHA512620c5d61598bebf684b20a51bf4ac1e5fe72961891a64bf05e441ba3972eb594d2cf958783fd7761e9eb2a5b61a92eb2fcb6f1936df8623c90036d37ab34d43d
-
Filesize
600B
MD5ba725451bfc91d22a38348cf0810b73e
SHA17d6eca2bc6a8897dcd1ad65c9231124f8fafa86f
SHA2566de20e2ad5037fc80739503142896517470b60c057c07bc8bcbece8611466649
SHA512d725b6afcd3e768d2a5522216dafbe0ab37fbd30aaf42effe1e353a25fd1327776dc3b0f99b31e45005d9427bb2ec994f219fb33e1414d3e1161d5110a8a81af
-
Filesize
1KB
MD5b93c1f5d5ee08218c67bc2d6993a38e4
SHA1f92d8d7b14477d68c289ea6f7a84129a7e7ec010
SHA256055c4340f16c5126c76e9385e2e91dfe6aa0437629ce386072c523a351a945cb
SHA512decccebc82ce16b343b98fc69f567fa46213c10c6664e575bff38a89481bb61541a82c1b0c4d748baf39710331a3091525822b9641bd2ef2cfc173d262ff5235