Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2025, 19:21

General

  • Target

    JaffaCakes118_65c7ad50698a62817c8dc71251d5deb5.exe

  • Size

    276KB

  • MD5

    65c7ad50698a62817c8dc71251d5deb5

  • SHA1

    747cae7bdadfae2aace7fdc3118c566bda94cb41

  • SHA256

    f34b6ff726164cfe63857d7f4a4cf975049b79468a641c515e1ac779750c7236

  • SHA512

    e6fcd718f6e3fc296024b41c7c18de4426ff5e651feb04d896298dccbff59bb2e1a7b16ce7d51cf16928e097aeec5a0ce9f8b42eec2eeb54858974393233e377

  • SSDEEP

    6144:Kx2baoXVgebPAuOplAZGOgAbzqfvWQX8zy0GnhZZ7i+vXl2h7VnI:9JqlhOgAPqfvWN+0GfNHfl2FVn

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65c7ad50698a62817c8dc71251d5deb5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65c7ad50698a62817c8dc71251d5deb5.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65c7ad50698a62817c8dc71251d5deb5.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65c7ad50698a62817c8dc71251d5deb5.exe startC:\Users\Admin\AppData\Roaming\E258F\3F5BF.exe%C:\Users\Admin\AppData\Roaming\E258F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2896
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65c7ad50698a62817c8dc71251d5deb5.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65c7ad50698a62817c8dc71251d5deb5.exe startC:\Program Files (x86)\8FBEC\lvvm.exe%C:\Program Files (x86)\8FBEC
      2⤵
      • System Location Discovery: System Language Discovery
      PID:300
    • C:\Program Files (x86)\LP\BF8E\F2F6.tmp
      "C:\Program Files (x86)\LP\BF8E\F2F6.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1316
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2716
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\E258F\FBEC.258

    Filesize

    996B

    MD5

    d6637a42349fba37b890d82eac6e0af3

    SHA1

    18575003aee6b74d6e5e043084822b4b91249956

    SHA256

    f075342588ef3a26716987988c6a4fe0b99373732976fc0d7f892aae4e58f484

    SHA512

    c7f2bcb38dda827d9ed1e037639841d02ded70d198eb03d8d25d2189e9ea180fc7c3b72e0a2870a7e9c5a4f4b54795117fdaf8762473c978a89ddb5ca14b606a

  • C:\Users\Admin\AppData\Roaming\E258F\FBEC.258

    Filesize

    600B

    MD5

    db1d4e68b39e6c6535fb2a511e1c7d36

    SHA1

    892bd748f0c3c6166677f4cd976513e2d8f38fb2

    SHA256

    2b007020927814e3efeef1ecbc8b3fdf54bd35e3e6a71b57f1c00581924fa3e2

    SHA512

    91c557f916594ed9b6e7c6e993e514ad66903eb391350098313b88b9d3d03ab36f6127e5daada9b4e3713487b9faaedeb31eaee432e187c872182a2fc543eab5

  • C:\Users\Admin\AppData\Roaming\E258F\FBEC.258

    Filesize

    1KB

    MD5

    c514b57f6c73dc9a5fee808f8ba02c77

    SHA1

    b67db0050017381c794561f9751685663a5b4a76

    SHA256

    5d849599987996ec6515d4a32251307ee007ee48d858541f56a8c50e69794b07

    SHA512

    4f645d5ed91414e661e5cc9b1dcef7bbe92aa05c2b4d44b3135d4f152bbe34ba27d6f9799bf32b2c40029a84f1fff6bad4b3f0f3a52b29954b0e7c8c6961a4c4

  • \Program Files (x86)\LP\BF8E\F2F6.tmp

    Filesize

    97KB

    MD5

    35ada42115983644d2693f236ad65c57

    SHA1

    c732b06d0db7c9e18c79c8af9ceb75120988f7f8

    SHA256

    73f21aa459b1f32253cd7a29ddb141108c7948ab398597ed63593dd74cd5f011

    SHA512

    f5a0456d2ae3474780da2ff603d909bb800fd8b8d6188a1381c5b2f04a58da603cef762c7f30813e66a295ecd3bdbd8522ad8e7afceb8ff93449e319cd0955e0

  • memory/300-121-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/300-123-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1316-316-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1316-315-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2848-119-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2848-0-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2848-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2848-13-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2848-314-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2848-3-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2848-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2848-319-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2896-18-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2896-16-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB