Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/01/2025, 11:47

General

  • Target

    JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe

  • Size

    165KB

  • MD5

    69e4502eecbc587f03a0af483fc5c4e9

  • SHA1

    1ed044044987a6e41c4494b81317aad5ab1717ef

  • SHA256

    8850b727f8482bbf8a4b5fbfb7e79df6c66836365fa86c49f3ee2f6a0f6306a2

  • SHA512

    be93584c5b4ddafdb44096c935b017d9085d954c7cc72c2669e301e2dd88e5be73e41892ed10f1de138f1720a4862ceeb33b381afd8f697e0f391d188d145ffd

  • SSDEEP

    3072:26wzTbiNJa0QyDNKKRh9IXAoStBYAeTCRKnOs4E55FmGxSGf2V+:CzKN00QfOtHKIvElmKfq+

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:404
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe startC:\Program Files (x86)\LP\F9D3\59B.exe%C:\Program Files (x86)\LP\F9D3
      2⤵
        PID:4416
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e4502eecbc587f03a0af483fc5c4e9.exe startC:\Program Files (x86)\F8258\lvvm.exe%C:\Program Files (x86)\F8258
        2⤵
          PID:3328

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\3EDF8\8258.EDF

        Filesize

        300B

        MD5

        d0f0c7cf217bd68599d461de382e1214

        SHA1

        a65946295abeea4eca4e9a73b04980bcd8a3e077

        SHA256

        fb6567552dffa7daf17a7dc6307dd41c1e0149b064441d3bf99ea987d05cfe73

        SHA512

        897fe05c34194c2ed2b475be9f69337d656addc4aadb23a788eebc41850b753c88e489eed380e6669f8bd55b8826e358a927e1d0dc5946daac09ecdcfa612db1

      • C:\Users\Admin\AppData\Roaming\3EDF8\8258.EDF

        Filesize

        996B

        MD5

        f1cb38df00024f1b557f4278a6ecf6f4

        SHA1

        79c7298cc73acff8b1e04b393fdcd46cd897b6d1

        SHA256

        fd438da13be973dbb276882e9f49a6a7aaf2b2360b617553d50337b328391df8

        SHA512

        8eeadcfa5c431a151687bd22b3e3f692d756be8215fc08afd9e685eb65b4c73ef1eb9bbe02377668fc6c31db85d4ff400238c0f1c2006e898f4e31a89e9491e2

      • C:\Users\Admin\AppData\Roaming\3EDF8\8258.EDF

        Filesize

        600B

        MD5

        cf43f3bc791728ea1484a81eea818804

        SHA1

        53000278490c40f4d437d1ed5c84ee51214d18a3

        SHA256

        7cd9609420107878557d28ef3b26293543816b76f6e01f00dd9ddec1d2deb3cd

        SHA512

        603d44f445a7d40da9ac6c75cb2b83d5a9fae307d8c76591cc80449c09bdedf1399e5bbfa9f48efb338c7b034322685ad52a8edfde0866e1dd1f84765f84f853

      • C:\Users\Admin\AppData\Roaming\3EDF8\8258.EDF

        Filesize

        1KB

        MD5

        d850cb6c5e44d70c8f5506c8ad6f1484

        SHA1

        9b32f7cf5f7464e6a27f566415c965efcb2b81c0

        SHA256

        9c84cb3e7c6a768bfa8b1f4fbf859335c7cc9d7626bdf8411e83dee84efbf4b3

        SHA512

        7c33b5cd7b73700f6390a1e3647b9eac919af851f0710dcb39cf90583671c8b55e9a3cb7a5dd5b3bf572759966220a7b85c54fddc91b2a4149544ec3cfe9df30

      • memory/404-17-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/404-0-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/404-18-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/404-143-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/404-3-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/404-2-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/404-309-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/3328-141-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/3328-142-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/4416-16-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/4416-14-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB