Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/01/2025, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe
-
Size
196KB
-
MD5
640e5bdf2f5d175718d5a04265d33233
-
SHA1
15b7d143b8c867824c75b6321ac3c30c18fff941
-
SHA256
e0c9bc0b34e76c1918c67c6248edaa5b3f143a47d1947812a5b3d2c24e4ac658
-
SHA512
17b3447597a7685089d3e2095016061e6fc936d0f1c3240a8a6bac925d046db46bbdf00e0e2f6a36a15fb6197218ec4c9bb9e33914aa8922bb6e0a5a9aaa4b02
-
SSDEEP
3072:dnbnGY+SVOb3uSwyLB1VUB4N6V8OWuzPuNKVo6DW6GAZOGZEVvWXmsz/TQl:dbGYTMbgyLB124AV8OWuzrtSCA+XmXl
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2632-6-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2632-7-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2992-15-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2552-75-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2552-77-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2992-148-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2992-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2632-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2632-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2992-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2552-75-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2552-77-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2992-148-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2632 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 30 PID 2992 wrote to memory of 2632 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 30 PID 2992 wrote to memory of 2632 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 30 PID 2992 wrote to memory of 2632 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 30 PID 2992 wrote to memory of 2552 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 33 PID 2992 wrote to memory of 2552 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 33 PID 2992 wrote to memory of 2552 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 33 PID 2992 wrote to memory of 2552 2992 JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640e5bdf2f5d175718d5a04265d33233.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD551bddd4591a0cf8523063093c9a5fbf3
SHA1e5a112908c4ec52aaf9ff44ff7d17ad29cc3aea4
SHA256b3ffed925e722b238ff99067e24f29c4d7ff65ab2e9d5ba8ec75d4097e8940c7
SHA5124e64de733cb1608298a50dc0beb4066c725a9986f67c6b962e7852883c406f536b0970014b61f9f5bfefd3b60c87075ee5498745a8dfa96609d6fa8f5971b857
-
Filesize
1KB
MD5bd4cd2fca1a3c58ab3b52470c80d8711
SHA1a92740309e0f74eff2bf1f110d73c34b8056d1b2
SHA256139669e3cd54aacb6af64e5be8d55de12b08e343de0357d2f35b14ed1f8c40bf
SHA512879bcbb3a346ed95355c28283ff2baf7bf09a1da8e5fcf684a3f340d2ce2655bab85ae7d96e1a60b2eeb0701db32b4a9aba160625b9182e8d760b2e983a877e0