Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2025, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe
-
Size
165KB
-
MD5
69e4502eecbc587f03a0af483fc5c4e9
-
SHA1
1ed044044987a6e41c4494b81317aad5ab1717ef
-
SHA256
8850b727f8482bbf8a4b5fbfb7e79df6c66836365fa86c49f3ee2f6a0f6306a2
-
SHA512
be93584c5b4ddafdb44096c935b017d9085d954c7cc72c2669e301e2dd88e5be73e41892ed10f1de138f1720a4862ceeb33b381afd8f697e0f391d188d145ffd
-
SSDEEP
3072:26wzTbiNJa0QyDNKKRh9IXAoStBYAeTCRKnOs4E55FmGxSGf2V+:CzKN00QfOtHKIvElmKfq+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4416-16-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/404-17-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/404-18-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/3328-142-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/404-143-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot behavioral2/memory/404-309-0x0000000000400000-0x0000000000490000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\3EDF8\\C41F9.exe" JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe -
resource yara_rule behavioral2/memory/404-3-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4416-14-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4416-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/404-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/404-18-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3328-141-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/3328-142-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/404-143-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/404-309-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 404 wrote to memory of 4416 404 JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe 84 PID 404 wrote to memory of 4416 404 JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe 84 PID 404 wrote to memory of 4416 404 JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe 84 PID 404 wrote to memory of 3328 404 JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe 90 PID 404 wrote to memory of 3328 404 JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe 90 PID 404 wrote to memory of 3328 404 JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe startC:\Program Files (x86)\LP\F9D3\59B.exe%C:\Program Files (x86)\LP\F9D32⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe startC:\Program Files (x86)\F8258\lvvm.exe%C:\Program Files (x86)\F82582⤵PID:3328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5d0f0c7cf217bd68599d461de382e1214
SHA1a65946295abeea4eca4e9a73b04980bcd8a3e077
SHA256fb6567552dffa7daf17a7dc6307dd41c1e0149b064441d3bf99ea987d05cfe73
SHA512897fe05c34194c2ed2b475be9f69337d656addc4aadb23a788eebc41850b753c88e489eed380e6669f8bd55b8826e358a927e1d0dc5946daac09ecdcfa612db1
-
Filesize
996B
MD5f1cb38df00024f1b557f4278a6ecf6f4
SHA179c7298cc73acff8b1e04b393fdcd46cd897b6d1
SHA256fd438da13be973dbb276882e9f49a6a7aaf2b2360b617553d50337b328391df8
SHA5128eeadcfa5c431a151687bd22b3e3f692d756be8215fc08afd9e685eb65b4c73ef1eb9bbe02377668fc6c31db85d4ff400238c0f1c2006e898f4e31a89e9491e2
-
Filesize
600B
MD5cf43f3bc791728ea1484a81eea818804
SHA153000278490c40f4d437d1ed5c84ee51214d18a3
SHA2567cd9609420107878557d28ef3b26293543816b76f6e01f00dd9ddec1d2deb3cd
SHA512603d44f445a7d40da9ac6c75cb2b83d5a9fae307d8c76591cc80449c09bdedf1399e5bbfa9f48efb338c7b034322685ad52a8edfde0866e1dd1f84765f84f853
-
Filesize
1KB
MD5d850cb6c5e44d70c8f5506c8ad6f1484
SHA19b32f7cf5f7464e6a27f566415c965efcb2b81c0
SHA2569c84cb3e7c6a768bfa8b1f4fbf859335c7cc9d7626bdf8411e83dee84efbf4b3
SHA5127c33b5cd7b73700f6390a1e3647b9eac919af851f0710dcb39cf90583671c8b55e9a3cb7a5dd5b3bf572759966220a7b85c54fddc91b2a4149544ec3cfe9df30